est_data communication lecture
DESCRIPTION
lecture for data commTRANSCRIPT
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Table of Contents
Part OneI Introduction of Data Communications
II Data Transmission
III OSI
IV Networking (LAN)
V Internetworking (WAN)
Part Two
VI Modem and InterfaceVII ISDN
VIII X25Frame RelayATM
IX SONETSDH
X TCPIP
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
I INTRODUCTION of DATA COMMUNICATIONS
Data Communication
bull is the exchange of data between two devices via some form oftransmission system
(Data Communications amp Networking by Forouzan)
bull is the transmission of binary or digital information from one point to
another
(Communications Electronics by Frenzel)
bull is the process of transmitting and receiving digital information from
one point to another via electrical radio and optical means
(general definition)
Data bull refers to a facts concepts and instructionsbull it is also known as digital information
Bit (binary digit) bull is the smallest unit of information (0s or 1s)
Forms of Information
bull sound (voice music and the like) bull text (alphanumeric and other special characters)
bull video (moving images)
bull images (graphics and pictures)
Components of Data Communication System
1 information source 5 decoder2 encoder 6 destination
3 transmission medium 7 noise
4 repeaters 8 attenuation
1 2 3 4 5 6
7
8
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Five Basic Components of Data Communications
ProtocolProtocol Message
Medium
Sender Receiver
Protocol
bull is a set of rules that governs the data communications
Standards
bull are guidelines to manufacturers government agencies other service
providers to ensure the kind of interconnectivity necessary in todayrsquosmarketplace and international communications
Two Categories of Standards
Standards
Reasons for Standardization
bull Ensure hardware software compatibility
bull Promote competition with high quality
bull Consumer can hold down the pricesbull It opened the possibility to build networks and share information (inter-
operational of different networks)
bull Ensure Reliable communication ndash ldquoprotocolrdquobull Determine standard methods of communications
De facto De jure
Proprietary Non-proprietary
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standard-Making Bodies
ITU ndash International Telecommunication Union
an international standards organization related to the United Nations that develops
standards in telecommunications
ANSI ndash American National Standard Institution
a nonprofit organization is the US voting representative to both the ISO and ITU
IEEE ndash Institute of Electronics amp Electrical Engineers
is the largest national professional group involved in developing standards for
computing communications electrical engineering and electronics
EIA ndash Electronic Industries Association
is an association of electronics manufacturers in the US
FCC ndash Federal Communication Commissionhas the authority over interstate and international commerce as it relates to
communications
Responsibilities
bull review rate and service-charge applications made by T amp T providers
bull review technical specifications of communications hardwarebull establish reasonable common carriers rates of return
bull divide and allocate radio frequencies
bull assign carrier frequencies for radio and television broadcast
ISO ndash International Standard Organization
bull Established in 1947
bull A multinational body dedicated to worldwide agreement on
international standardsbull Covers all aspects of network communication in the OSI model
II DATA TRANSMISSION
According to Request and Response
bull Simplex one way communication
Ex AMFMTV broadcasting beeperbull Half Duplex two way communication but one at a time
Ex Military radio walkie-talkiebull Full Duplex simultaneous two way communication
Ex Cellfone telephonebull Full-full Duplex more than a half duplex but less than a full duplex
Ex Computer communication
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Timing
bull Asynchronous
bull Sending one start bit (0) at the beginning and one or more stop bits (1) at
the end of each bit
bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same
bull Synchronous
bull Sending bits one after another without startstop bits or gaps It is the
responsibility of the receiver to group the bits
According to Number of Links
bull Serial one at a time bit transmission
1001001
100100
1001001
bull Parallel group of bits transmission
1001001
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
III OPEN SYSTEM INTERCONNECTION
OSI Open System Interconnection
bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications
bull Reference model describes how information from a software applications
in one computer moves through a network medium to a software
application in another computerbull A conceptual model composed of 7 layers each specifying particular
function divides the tasks into more manageable
task groupsbull It is a not a protocol it is a model for understanding and designing a
network architecture that is flexible robust and interoperable
Layer
bull Define as the segment of the process of moving information across a
networkbull Defines a family of functions distinct from other layers
bull Is reasonably self-contained to implement task assigned independently
Solution to update without adversely affecting the other layers
Internetwork
Is a collection of individual networks connected by intermediate devices
that function as a single large network
Open System
Is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture
Closed System
A vendor specified protocol
OSI-RM Open System Interconnection-Reference Model
Mnemonic Please Do Not Touch Steversquos Pet Alligator
bull Layer 7 Applicationbull Layer 6 Presentation
bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network
bull Layer 2 Datalink
bull Layer 1 Physical
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
A lication
Presentation
Session
Trans ort
Network
Datalink
Ph sical
Characteristics of OSI Layers
Two Categories1 Upper Layers
Deal with application issues and generally are implemented only in software
Refer to any above layers in the OSI model
2 Lower Layers
Handle data transport issues and implemented in both hardware and software
Protocol
Is a formal set of rules and conventions that governs how computers exchange
information over a network medium
Groups of Protocol 1 LAN Protocol (Local Area Network)
Operate at the network and datalink layers define communications over variousLAN media
2 WAN Protocol (Wide Area Network)
Operate at the lowest 3 layers of OSI and define communications over the various
wide area media
3 Routing Protocol
Network layer protocols that are responsible for path determination and traffic
switching
4 Network Protocol
Various upper-layer protocols that exist in a given OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Application Application
Interfaces
The link between two adjacent layers of the OSI model
EncapsulationFraming
The process of putting the data unit into frame
Session
Transport
Presentation Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Datalink
Network
Physical
Interface 3-2
Interface 2-1
Session
Transport
Datalink
Network
Presentation
Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Network
Physical
Interface 3-2Interface 3-2
Datalink
Interface 2-1Interface 2-1
Physical
L7 data
L7 data H6
L6 data H5
H4
L4 data H3
L3 data H2T2
010101011011110110111110111110
L5 data
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
I INTRODUCTION of DATA COMMUNICATIONS
Data Communication
bull is the exchange of data between two devices via some form oftransmission system
(Data Communications amp Networking by Forouzan)
bull is the transmission of binary or digital information from one point to
another
(Communications Electronics by Frenzel)
bull is the process of transmitting and receiving digital information from
one point to another via electrical radio and optical means
(general definition)
Data bull refers to a facts concepts and instructionsbull it is also known as digital information
Bit (binary digit) bull is the smallest unit of information (0s or 1s)
Forms of Information
bull sound (voice music and the like) bull text (alphanumeric and other special characters)
bull video (moving images)
bull images (graphics and pictures)
Components of Data Communication System
1 information source 5 decoder2 encoder 6 destination
3 transmission medium 7 noise
4 repeaters 8 attenuation
1 2 3 4 5 6
7
8
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Five Basic Components of Data Communications
ProtocolProtocol Message
Medium
Sender Receiver
Protocol
bull is a set of rules that governs the data communications
Standards
bull are guidelines to manufacturers government agencies other service
providers to ensure the kind of interconnectivity necessary in todayrsquosmarketplace and international communications
Two Categories of Standards
Standards
Reasons for Standardization
bull Ensure hardware software compatibility
bull Promote competition with high quality
bull Consumer can hold down the pricesbull It opened the possibility to build networks and share information (inter-
operational of different networks)
bull Ensure Reliable communication ndash ldquoprotocolrdquobull Determine standard methods of communications
De facto De jure
Proprietary Non-proprietary
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standard-Making Bodies
ITU ndash International Telecommunication Union
an international standards organization related to the United Nations that develops
standards in telecommunications
ANSI ndash American National Standard Institution
a nonprofit organization is the US voting representative to both the ISO and ITU
IEEE ndash Institute of Electronics amp Electrical Engineers
is the largest national professional group involved in developing standards for
computing communications electrical engineering and electronics
EIA ndash Electronic Industries Association
is an association of electronics manufacturers in the US
FCC ndash Federal Communication Commissionhas the authority over interstate and international commerce as it relates to
communications
Responsibilities
bull review rate and service-charge applications made by T amp T providers
bull review technical specifications of communications hardwarebull establish reasonable common carriers rates of return
bull divide and allocate radio frequencies
bull assign carrier frequencies for radio and television broadcast
ISO ndash International Standard Organization
bull Established in 1947
bull A multinational body dedicated to worldwide agreement on
international standardsbull Covers all aspects of network communication in the OSI model
II DATA TRANSMISSION
According to Request and Response
bull Simplex one way communication
Ex AMFMTV broadcasting beeperbull Half Duplex two way communication but one at a time
Ex Military radio walkie-talkiebull Full Duplex simultaneous two way communication
Ex Cellfone telephonebull Full-full Duplex more than a half duplex but less than a full duplex
Ex Computer communication
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Timing
bull Asynchronous
bull Sending one start bit (0) at the beginning and one or more stop bits (1) at
the end of each bit
bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same
bull Synchronous
bull Sending bits one after another without startstop bits or gaps It is the
responsibility of the receiver to group the bits
According to Number of Links
bull Serial one at a time bit transmission
1001001
100100
1001001
bull Parallel group of bits transmission
1001001
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
III OPEN SYSTEM INTERCONNECTION
OSI Open System Interconnection
bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications
bull Reference model describes how information from a software applications
in one computer moves through a network medium to a software
application in another computerbull A conceptual model composed of 7 layers each specifying particular
function divides the tasks into more manageable
task groupsbull It is a not a protocol it is a model for understanding and designing a
network architecture that is flexible robust and interoperable
Layer
bull Define as the segment of the process of moving information across a
networkbull Defines a family of functions distinct from other layers
bull Is reasonably self-contained to implement task assigned independently
Solution to update without adversely affecting the other layers
Internetwork
Is a collection of individual networks connected by intermediate devices
that function as a single large network
Open System
Is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture
Closed System
A vendor specified protocol
OSI-RM Open System Interconnection-Reference Model
Mnemonic Please Do Not Touch Steversquos Pet Alligator
bull Layer 7 Applicationbull Layer 6 Presentation
bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network
bull Layer 2 Datalink
bull Layer 1 Physical
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
A lication
Presentation
Session
Trans ort
Network
Datalink
Ph sical
Characteristics of OSI Layers
Two Categories1 Upper Layers
Deal with application issues and generally are implemented only in software
Refer to any above layers in the OSI model
2 Lower Layers
Handle data transport issues and implemented in both hardware and software
Protocol
Is a formal set of rules and conventions that governs how computers exchange
information over a network medium
Groups of Protocol 1 LAN Protocol (Local Area Network)
Operate at the network and datalink layers define communications over variousLAN media
2 WAN Protocol (Wide Area Network)
Operate at the lowest 3 layers of OSI and define communications over the various
wide area media
3 Routing Protocol
Network layer protocols that are responsible for path determination and traffic
switching
4 Network Protocol
Various upper-layer protocols that exist in a given OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Application Application
Interfaces
The link between two adjacent layers of the OSI model
EncapsulationFraming
The process of putting the data unit into frame
Session
Transport
Presentation Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Datalink
Network
Physical
Interface 3-2
Interface 2-1
Session
Transport
Datalink
Network
Presentation
Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Network
Physical
Interface 3-2Interface 3-2
Datalink
Interface 2-1Interface 2-1
Physical
L7 data
L7 data H6
L6 data H5
H4
L4 data H3
L3 data H2T2
010101011011110110111110111110
L5 data
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Five Basic Components of Data Communications
ProtocolProtocol Message
Medium
Sender Receiver
Protocol
bull is a set of rules that governs the data communications
Standards
bull are guidelines to manufacturers government agencies other service
providers to ensure the kind of interconnectivity necessary in todayrsquosmarketplace and international communications
Two Categories of Standards
Standards
Reasons for Standardization
bull Ensure hardware software compatibility
bull Promote competition with high quality
bull Consumer can hold down the pricesbull It opened the possibility to build networks and share information (inter-
operational of different networks)
bull Ensure Reliable communication ndash ldquoprotocolrdquobull Determine standard methods of communications
De facto De jure
Proprietary Non-proprietary
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standard-Making Bodies
ITU ndash International Telecommunication Union
an international standards organization related to the United Nations that develops
standards in telecommunications
ANSI ndash American National Standard Institution
a nonprofit organization is the US voting representative to both the ISO and ITU
IEEE ndash Institute of Electronics amp Electrical Engineers
is the largest national professional group involved in developing standards for
computing communications electrical engineering and electronics
EIA ndash Electronic Industries Association
is an association of electronics manufacturers in the US
FCC ndash Federal Communication Commissionhas the authority over interstate and international commerce as it relates to
communications
Responsibilities
bull review rate and service-charge applications made by T amp T providers
bull review technical specifications of communications hardwarebull establish reasonable common carriers rates of return
bull divide and allocate radio frequencies
bull assign carrier frequencies for radio and television broadcast
ISO ndash International Standard Organization
bull Established in 1947
bull A multinational body dedicated to worldwide agreement on
international standardsbull Covers all aspects of network communication in the OSI model
II DATA TRANSMISSION
According to Request and Response
bull Simplex one way communication
Ex AMFMTV broadcasting beeperbull Half Duplex two way communication but one at a time
Ex Military radio walkie-talkiebull Full Duplex simultaneous two way communication
Ex Cellfone telephonebull Full-full Duplex more than a half duplex but less than a full duplex
Ex Computer communication
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Timing
bull Asynchronous
bull Sending one start bit (0) at the beginning and one or more stop bits (1) at
the end of each bit
bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same
bull Synchronous
bull Sending bits one after another without startstop bits or gaps It is the
responsibility of the receiver to group the bits
According to Number of Links
bull Serial one at a time bit transmission
1001001
100100
1001001
bull Parallel group of bits transmission
1001001
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
III OPEN SYSTEM INTERCONNECTION
OSI Open System Interconnection
bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications
bull Reference model describes how information from a software applications
in one computer moves through a network medium to a software
application in another computerbull A conceptual model composed of 7 layers each specifying particular
function divides the tasks into more manageable
task groupsbull It is a not a protocol it is a model for understanding and designing a
network architecture that is flexible robust and interoperable
Layer
bull Define as the segment of the process of moving information across a
networkbull Defines a family of functions distinct from other layers
bull Is reasonably self-contained to implement task assigned independently
Solution to update without adversely affecting the other layers
Internetwork
Is a collection of individual networks connected by intermediate devices
that function as a single large network
Open System
Is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture
Closed System
A vendor specified protocol
OSI-RM Open System Interconnection-Reference Model
Mnemonic Please Do Not Touch Steversquos Pet Alligator
bull Layer 7 Applicationbull Layer 6 Presentation
bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network
bull Layer 2 Datalink
bull Layer 1 Physical
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
A lication
Presentation
Session
Trans ort
Network
Datalink
Ph sical
Characteristics of OSI Layers
Two Categories1 Upper Layers
Deal with application issues and generally are implemented only in software
Refer to any above layers in the OSI model
2 Lower Layers
Handle data transport issues and implemented in both hardware and software
Protocol
Is a formal set of rules and conventions that governs how computers exchange
information over a network medium
Groups of Protocol 1 LAN Protocol (Local Area Network)
Operate at the network and datalink layers define communications over variousLAN media
2 WAN Protocol (Wide Area Network)
Operate at the lowest 3 layers of OSI and define communications over the various
wide area media
3 Routing Protocol
Network layer protocols that are responsible for path determination and traffic
switching
4 Network Protocol
Various upper-layer protocols that exist in a given OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Application Application
Interfaces
The link between two adjacent layers of the OSI model
EncapsulationFraming
The process of putting the data unit into frame
Session
Transport
Presentation Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Datalink
Network
Physical
Interface 3-2
Interface 2-1
Session
Transport
Datalink
Network
Presentation
Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Network
Physical
Interface 3-2Interface 3-2
Datalink
Interface 2-1Interface 2-1
Physical
L7 data
L7 data H6
L6 data H5
H4
L4 data H3
L3 data H2T2
010101011011110110111110111110
L5 data
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standard-Making Bodies
ITU ndash International Telecommunication Union
an international standards organization related to the United Nations that develops
standards in telecommunications
ANSI ndash American National Standard Institution
a nonprofit organization is the US voting representative to both the ISO and ITU
IEEE ndash Institute of Electronics amp Electrical Engineers
is the largest national professional group involved in developing standards for
computing communications electrical engineering and electronics
EIA ndash Electronic Industries Association
is an association of electronics manufacturers in the US
FCC ndash Federal Communication Commissionhas the authority over interstate and international commerce as it relates to
communications
Responsibilities
bull review rate and service-charge applications made by T amp T providers
bull review technical specifications of communications hardwarebull establish reasonable common carriers rates of return
bull divide and allocate radio frequencies
bull assign carrier frequencies for radio and television broadcast
ISO ndash International Standard Organization
bull Established in 1947
bull A multinational body dedicated to worldwide agreement on
international standardsbull Covers all aspects of network communication in the OSI model
II DATA TRANSMISSION
According to Request and Response
bull Simplex one way communication
Ex AMFMTV broadcasting beeperbull Half Duplex two way communication but one at a time
Ex Military radio walkie-talkiebull Full Duplex simultaneous two way communication
Ex Cellfone telephonebull Full-full Duplex more than a half duplex but less than a full duplex
Ex Computer communication
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Timing
bull Asynchronous
bull Sending one start bit (0) at the beginning and one or more stop bits (1) at
the end of each bit
bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same
bull Synchronous
bull Sending bits one after another without startstop bits or gaps It is the
responsibility of the receiver to group the bits
According to Number of Links
bull Serial one at a time bit transmission
1001001
100100
1001001
bull Parallel group of bits transmission
1001001
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
III OPEN SYSTEM INTERCONNECTION
OSI Open System Interconnection
bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications
bull Reference model describes how information from a software applications
in one computer moves through a network medium to a software
application in another computerbull A conceptual model composed of 7 layers each specifying particular
function divides the tasks into more manageable
task groupsbull It is a not a protocol it is a model for understanding and designing a
network architecture that is flexible robust and interoperable
Layer
bull Define as the segment of the process of moving information across a
networkbull Defines a family of functions distinct from other layers
bull Is reasonably self-contained to implement task assigned independently
Solution to update without adversely affecting the other layers
Internetwork
Is a collection of individual networks connected by intermediate devices
that function as a single large network
Open System
Is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture
Closed System
A vendor specified protocol
OSI-RM Open System Interconnection-Reference Model
Mnemonic Please Do Not Touch Steversquos Pet Alligator
bull Layer 7 Applicationbull Layer 6 Presentation
bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network
bull Layer 2 Datalink
bull Layer 1 Physical
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
A lication
Presentation
Session
Trans ort
Network
Datalink
Ph sical
Characteristics of OSI Layers
Two Categories1 Upper Layers
Deal with application issues and generally are implemented only in software
Refer to any above layers in the OSI model
2 Lower Layers
Handle data transport issues and implemented in both hardware and software
Protocol
Is a formal set of rules and conventions that governs how computers exchange
information over a network medium
Groups of Protocol 1 LAN Protocol (Local Area Network)
Operate at the network and datalink layers define communications over variousLAN media
2 WAN Protocol (Wide Area Network)
Operate at the lowest 3 layers of OSI and define communications over the various
wide area media
3 Routing Protocol
Network layer protocols that are responsible for path determination and traffic
switching
4 Network Protocol
Various upper-layer protocols that exist in a given OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Application Application
Interfaces
The link between two adjacent layers of the OSI model
EncapsulationFraming
The process of putting the data unit into frame
Session
Transport
Presentation Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Datalink
Network
Physical
Interface 3-2
Interface 2-1
Session
Transport
Datalink
Network
Presentation
Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Network
Physical
Interface 3-2Interface 3-2
Datalink
Interface 2-1Interface 2-1
Physical
L7 data
L7 data H6
L6 data H5
H4
L4 data H3
L3 data H2T2
010101011011110110111110111110
L5 data
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Timing
bull Asynchronous
bull Sending one start bit (0) at the beginning and one or more stop bits (1) at
the end of each bit
bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same
bull Synchronous
bull Sending bits one after another without startstop bits or gaps It is the
responsibility of the receiver to group the bits
According to Number of Links
bull Serial one at a time bit transmission
1001001
100100
1001001
bull Parallel group of bits transmission
1001001
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
III OPEN SYSTEM INTERCONNECTION
OSI Open System Interconnection
bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications
bull Reference model describes how information from a software applications
in one computer moves through a network medium to a software
application in another computerbull A conceptual model composed of 7 layers each specifying particular
function divides the tasks into more manageable
task groupsbull It is a not a protocol it is a model for understanding and designing a
network architecture that is flexible robust and interoperable
Layer
bull Define as the segment of the process of moving information across a
networkbull Defines a family of functions distinct from other layers
bull Is reasonably self-contained to implement task assigned independently
Solution to update without adversely affecting the other layers
Internetwork
Is a collection of individual networks connected by intermediate devices
that function as a single large network
Open System
Is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture
Closed System
A vendor specified protocol
OSI-RM Open System Interconnection-Reference Model
Mnemonic Please Do Not Touch Steversquos Pet Alligator
bull Layer 7 Applicationbull Layer 6 Presentation
bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network
bull Layer 2 Datalink
bull Layer 1 Physical
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
A lication
Presentation
Session
Trans ort
Network
Datalink
Ph sical
Characteristics of OSI Layers
Two Categories1 Upper Layers
Deal with application issues and generally are implemented only in software
Refer to any above layers in the OSI model
2 Lower Layers
Handle data transport issues and implemented in both hardware and software
Protocol
Is a formal set of rules and conventions that governs how computers exchange
information over a network medium
Groups of Protocol 1 LAN Protocol (Local Area Network)
Operate at the network and datalink layers define communications over variousLAN media
2 WAN Protocol (Wide Area Network)
Operate at the lowest 3 layers of OSI and define communications over the various
wide area media
3 Routing Protocol
Network layer protocols that are responsible for path determination and traffic
switching
4 Network Protocol
Various upper-layer protocols that exist in a given OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Application Application
Interfaces
The link between two adjacent layers of the OSI model
EncapsulationFraming
The process of putting the data unit into frame
Session
Transport
Presentation Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Datalink
Network
Physical
Interface 3-2
Interface 2-1
Session
Transport
Datalink
Network
Presentation
Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Network
Physical
Interface 3-2Interface 3-2
Datalink
Interface 2-1Interface 2-1
Physical
L7 data
L7 data H6
L6 data H5
H4
L4 data H3
L3 data H2T2
010101011011110110111110111110
L5 data
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
III OPEN SYSTEM INTERCONNECTION
OSI Open System Interconnection
bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications
bull Reference model describes how information from a software applications
in one computer moves through a network medium to a software
application in another computerbull A conceptual model composed of 7 layers each specifying particular
function divides the tasks into more manageable
task groupsbull It is a not a protocol it is a model for understanding and designing a
network architecture that is flexible robust and interoperable
Layer
bull Define as the segment of the process of moving information across a
networkbull Defines a family of functions distinct from other layers
bull Is reasonably self-contained to implement task assigned independently
Solution to update without adversely affecting the other layers
Internetwork
Is a collection of individual networks connected by intermediate devices
that function as a single large network
Open System
Is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture
Closed System
A vendor specified protocol
OSI-RM Open System Interconnection-Reference Model
Mnemonic Please Do Not Touch Steversquos Pet Alligator
bull Layer 7 Applicationbull Layer 6 Presentation
bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network
bull Layer 2 Datalink
bull Layer 1 Physical
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
A lication
Presentation
Session
Trans ort
Network
Datalink
Ph sical
Characteristics of OSI Layers
Two Categories1 Upper Layers
Deal with application issues and generally are implemented only in software
Refer to any above layers in the OSI model
2 Lower Layers
Handle data transport issues and implemented in both hardware and software
Protocol
Is a formal set of rules and conventions that governs how computers exchange
information over a network medium
Groups of Protocol 1 LAN Protocol (Local Area Network)
Operate at the network and datalink layers define communications over variousLAN media
2 WAN Protocol (Wide Area Network)
Operate at the lowest 3 layers of OSI and define communications over the various
wide area media
3 Routing Protocol
Network layer protocols that are responsible for path determination and traffic
switching
4 Network Protocol
Various upper-layer protocols that exist in a given OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Application Application
Interfaces
The link between two adjacent layers of the OSI model
EncapsulationFraming
The process of putting the data unit into frame
Session
Transport
Presentation Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Datalink
Network
Physical
Interface 3-2
Interface 2-1
Session
Transport
Datalink
Network
Presentation
Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Network
Physical
Interface 3-2Interface 3-2
Datalink
Interface 2-1Interface 2-1
Physical
L7 data
L7 data H6
L6 data H5
H4
L4 data H3
L3 data H2T2
010101011011110110111110111110
L5 data
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
A lication
Presentation
Session
Trans ort
Network
Datalink
Ph sical
Characteristics of OSI Layers
Two Categories1 Upper Layers
Deal with application issues and generally are implemented only in software
Refer to any above layers in the OSI model
2 Lower Layers
Handle data transport issues and implemented in both hardware and software
Protocol
Is a formal set of rules and conventions that governs how computers exchange
information over a network medium
Groups of Protocol 1 LAN Protocol (Local Area Network)
Operate at the network and datalink layers define communications over variousLAN media
2 WAN Protocol (Wide Area Network)
Operate at the lowest 3 layers of OSI and define communications over the various
wide area media
3 Routing Protocol
Network layer protocols that are responsible for path determination and traffic
switching
4 Network Protocol
Various upper-layer protocols that exist in a given OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Application Application
Interfaces
The link between two adjacent layers of the OSI model
EncapsulationFraming
The process of putting the data unit into frame
Session
Transport
Presentation Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Datalink
Network
Physical
Interface 3-2
Interface 2-1
Session
Transport
Datalink
Network
Presentation
Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Network
Physical
Interface 3-2Interface 3-2
Datalink
Interface 2-1Interface 2-1
Physical
L7 data
L7 data H6
L6 data H5
H4
L4 data H3
L3 data H2T2
010101011011110110111110111110
L5 data
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Application Application
Interfaces
The link between two adjacent layers of the OSI model
EncapsulationFraming
The process of putting the data unit into frame
Session
Transport
Presentation Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Datalink
Network
Physical
Interface 3-2
Interface 2-1
Session
Transport
Datalink
Network
Presentation
Interface 7-6
Interface 6-5
Interface 5-4
Interface 4-3
Network
Physical
Interface 3-2Interface 3-2
Datalink
Interface 2-1Interface 2-1
Physical
L7 data
L7 data H6
L6 data H5
H4
L4 data H3
L3 data H2T2
010101011011110110111110111110
L5 data
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Information Formats in the OSI Layers
A frame is an information unit whose source and destination are datalink layer entities A
frame is composed of the datalink layer header (and possibly a trailer) and upper-layer
data The header and the trailer contain control information intended for the data-link
layer entity in the destination system
A packet is an information unit whose source and destination are network-layer entities
A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the
network-layer entity in the destination system The data from upper-layer entities is
encapsulated in the network-layer header and trailer
The term datagram usually refers to an information unit whose source and destination
are network-layer entities that use connectionless network services
The term segment usually refers to an information unit whose source and destination aretransport layer entities
A message is an information unit whose source and destination entities exist above the
network layer (often the application layer)
A cell is an information unit of a fixed size whose source and destination are datalink
layer entities Cells are used in switched environments such as ATM and SMDS A cell
is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The
payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long
Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol
data units (BPDU) SDUs are information units from upper-layer protocols that define a
service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS
are used by the spanning-tree algorithm as hello messages
Three Basic elements in Layer Services
1 Service User is the OSI layer that requests services from an adjacent OSI layer
2 Service Provider is the OSI layer that provides services to service users
3 Service Access Point is a conceptual location at which one OSI layer can request the
services of another OSI layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Physical Layerbull It deals with the mechanical and electrical specifications of primary connections
such as cables connectors and signaling options that physically link two nodes on
a network
bull It coordinates the functions required to transmit a bit stream over physical
mediumbull It oversees the changing of a bit stream into EM signals and across the medium
Number of Considerations
Line Configuration
Data transmission modeTopology
Signals
Encoding
InterfaceMedium
Datalink Layerbull It is responsible for delivering data units from one station to the next without
errors
bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information
Sublayers
LLC-Logical Link Control
Maintains the link between two nodes
MAC-Media Access ControlControls which computer on a network can be transmitting or receiving
data at a given time
Responsibilities
bull Node to node delivery
bull Access Controlbull Flow Control
bull Error handling
bull Synchronization
PhysicalNode Address
MAC Address Example
Node A - 87DE-FADA-DEAD
Node B - 8576-EDAD-CADE
Node C - CACA-BEAD-1562
Network Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Responsible for the source-to-destination delivery of a packet across multiple
network linksbull Ensures that each packet gets from its point of origin to its final destination
successfully and efficiently
bull Responsible for switching and routing
Switching
Refers to temporary connections between physical links resulting in longer linksfor network transmission
Routing
Means selecting the best path for sending a packet from one point to another when
more than one path is available
Responsibilities
bull Source-to-destination deliverybull Logical addressing
bull Routingbull Address transformation
bull Multiplexing
Logical Address
Address different from the physical addresses network layer addresses are those
of the original source and the final destination
Example
Quad-Dotted Decimal
0000 to 255255255255
12556242
Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of
the entire message
bull Ensures that the whole message arrives intact and in order
overseeing both error control and flow control at the source-to-
destination levelbull The network layer gets each packets to the correct computer
the transport layer gets the entire message to the correctapplication or that computer
bull Header contains sequences or segmentations numbers
Service Point Address
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Port address or socket address
bull The type of address in the transport layer header
Connection
bull Is a single logical path between the source and destination that is
associated with all packets in a message
Three Steps for Connections
1 Connection establishment2 Data transfer
3 Connection release
Responsibilities
bull End-to-end message delivery
bull Service point (port) addressingbull Segmentation and reassembly
bull Connection control
Session Layerbull The network dialog controller
bull It establishes maintains and synchronizes the interaction betweencommunicating devices
bull It ensures that each session closes appropriately rather than shutting down
abruptly and leaving the user hanging
bull Validates and establishes connections between usersbull Includes password and log-in verifications
bull Controls the exchange of data
bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time
Checkpoints
Allow a session to backtrack a certain distance without completely starting over
when problems arises
Responsibilities
1 Session management
2 Synchronization
3 Dialog Control
4 Graceful Close
Presentation Layer
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Ensures interoperability among communicating devices
bull Possible for two computers to communicate even if their internalrepresentations of data differ
bull Provides the necessary translation of different control codes
character sets graphics characters and so on to allow both devices to
understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and
for compression and expansion of data when necessary for transmission
efficiency
Application Layerbull Enables the user whether human or software to access the network
bull Provides user interfaces and support for services such as email remote
access and transfer shared database management and other types of
distributed information services
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IVNETWORKING (Local Area Network)
NETWORK
bull Is a set of devices connected by transmission media
NETWORKING
bull The process of linking devices together to share resources
Classification of Networks
According to area of coverage
LAN - Local Area Network
A connection of computers and other peripheral devices within a
building or clusters of building (campus)
MAN - Metropolitan Area Network
A network with less than 50 km radius within a metro or city
WAN - Wide Area Network
A network that covers a large geographical space such ascountries states continents and even the entire world
According to Configuration
Point-to-Point ndash two and only nodes are connected in a network
Multipoint ndash also known as multidrop network A network with multiple nodes
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
According to Authority
Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and
nodes in the network
LAN Components
1 Server
Is a computer in a network that shared by multiple users
2 Network Interface Card
A printed circuit board that plugs into a network server or client computer It
enables the computer to be physically connected to the network cable which provides the
physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol
3 HubA device that acts as central connection of certain LAN topology It is capable of
regeneration and switching of signals from one node to another Also known as
concentrator multiple access unit transceiver or repeater
4 Cable
The transmission link in a network These are unshielded twisted pairs (UTP)
shielded twisted pair (STP) coaxial cable and fiber optics cable
5 Connector
The terminating end of the cable to be plug-in or connected to the device
6 Network Operating System (NOS)
The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the
application programs and the computerrsquos operating system
7 Client
It is the requesting computer from the supplying computers or server
8 Other Peripheral Devices
These are the devices attached to the network such as printers scanners and the
like
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Transmission Method
1 Unicast
A single packet is sent from the a single source to a specific destination on a
network
2 Multicast
Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network
3 Broadcast
Transmission consists of a single data packet that is copied and sent to all nodes
on the networks
LAN Topology
Physical Topologybull the set up how devices are wired together includes configurations of
cables computers amp other peripherals
Logical Topology
bull the set up of how devices communicate or exchange information to
one another
bull method used to pass information between workstations
Main Types of Physical Topology
1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end
rarr nodes such as file server workstations and peripherals are connected on themain cable
Ex Ethernet and Local talk
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
2 STAR rarr designed with each node ( file server workstations and peripherals)
connected directly to central network hub or concentrator
rarr data passes through the hub or concentrator before continuing to its
destinationrarr the hub or concentrator manages and controls all functions of the
network
rarr the hub acts as repeater
rarr it is usually used with TP
3 TREE rarr combines characteristic of linear bus and star
rarr it consists of groups of star-configured workstations connected to a linear bus
backbone cable
rarr it allows for the expansion of an existing network and enable to meet network
needs
4 MESH
rarr nodes has connection to all other nodes in the network
rarr every node has available ports for connection to other nodes
rarr it consumes a lot of cable
5 STAR RING
rarr it may appear externally to be the same as a star topology
rarr it consists of groups of star-configured workstations connected to a
linear
rarr internally the MAU ( multistation access unit ) of a star-wired ring
contains wiring that allows information to pass from one device to
another in a circle or ring
Ex Token Ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
TOPOLOGY ADVANTAGES
LINEAR BUS Easy to connect a node
Requires less cables than star
STAR Easy to install and wire
No disruptions to the network when connecting orremoving devices
Easy to detect faults and remove parts
TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors
RING It provides equal opportunities to all computers in
the networkInstallation can be simple
Signals do not degrade
MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast
transmissionThere are other available routes in case of one link
disconnection
TOPOLOGY DISADVANTAGES
LINEAR BUS Entire network shunts down if main cable break
Entire network shuts down it is difficult to identify
the faults Not meant to be used as a solution for stand alone
system in a large buildingSTAR Requires more cable than a linear topology
If the hubs or concentrators fail nodes are disabled
More expensive than linear bus topologies becauseof hubs
TREE Overall length of each segment is limited by the
type of cabling used
If the backbone line breaks the entire segment goesdown
More difficult to configure and wire than other
topologiesRING Failure of any one connections can shut down the
entire network
Reconfiguration is difficult to implementDistance is limited
MESH Very expensive network
Messy to maintain and troubleshoot
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 1947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are
only two devices on the circuit and full duplex permits either device to
transmit at any time
rarr if it is point-to-point half duplex it needs MAC and also in multipoint full
duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time
1 Controlled Access
a X-on X-off
rarrthe oldest media access control protocols dating back to the days of theteletype
b Polling
rarr the process of sending signal to a terminal to transmit or asking it to receive
rarr it uses ldquoroll call pollingrdquo with scheme or sequence
Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1
c Token Passing
rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in
the network
Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message
2 Contention
rarr opposite of controlled access
rarr devices wait until the circuit is free and transmit whenever it has data to send
a Carrier Sense Multiple Access with Collision Detection (CSMACD)
rarrA channel accessing method a node monitors the line to determine if the line is
busy If the station has a message to transmit but the line is busy it waits for an
idle condition before it transmits its message
Collision is the situation when two nodes transmit simultaneously using one link
Backoff Time is the ceasing time before the station attempts to transmit again
With detection
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
No Detection
I have data to transmit tonode 4 Irsquoll send it now
Irsquoll send mydata to node
2Collision
I have data to transmitLet mecheck the line Node is sending data to
node 3 Irsquoll wait
I have data to transmitLetme check the line
No one is transmitting Irsquollsend my data to node 3
Comparison of Different Access Methods
Access Method Advantages Disadvantages
Polling Guaranteed access
Inefficient use of
network
Fast in low traffic Slow in high traffic
No access guaranteeContention Inexpensive No priority mechanism
Fast in high traffic Slow in low traffic
Guaranteed accessToken Passing
Time-criticalMore expensive
LAN Architecture
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
LAN-Local Area Network
A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area
Project 802
bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer
bull specifying functions of physical datalink and portions of network layers
to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions
necessary for LAN management the designers were able to standardize
that can be generalized and to isolate those that must remain specific
LAN Issues
bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo
bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that
occur and maximize the number of frames that are successfully delivered
IEEE 802 Specifications
Number Category
8021 Internetworking
8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN
8024 Token Bus LAN8025 Token Ring LAN
8026 Metropolitan Area Network
8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group
8029 Integrated VoiceData Networks
80210 Network Security
80211 Wireless Networks80212 Demand Priority Access LAN
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Ethernet
IEEE 8023 supports a LAN standard originally developed by Xerox and later extended
by a joint venture between Digital Equipment Corp Intel Corp and Xerox
8023 Categories
1 Baseband Category
Specifying digital signal (Manchester encoding)
2 Broadband Category
Specifying analog signal (PSK encoding)
Note
1st Number
10 1 and 100 indicates data rate in Mbps
Last Number
5 2 T and F indicates the maximum cable length or the type of cable
10-Base-5Thicknet LAN
Information Category Specifications
Advantages Long distances
Disadvantages Expensive difficult to install amp troubleshoot
Topology BusCable Type 50-ohm Thicknet coaxial
Connector Type Vampire Tap TransceiverAccess Method CSMACD
Max Segment Length 500 m (1640 ft)
Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m
Max Segments 5 only 3 populated
Max of nodessegment 100
Max of nodes for network 300Transmission Speed 10 Mbps
IEEE specifications 8023
Interference High resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
10-Base 2Thinnet LAN
Information Category Specifications
Advantages Simple to install inexpensive
Disadvantages Difficult to troubleshootTopology Bus
Cable Type 50-ohm Thinnet coaxial-RG 58AU
Connector Type BNCAccess Method CSMACD
Max Segment Length 185 m (607 ft)
Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m
Max Segments 5 only 3 populated
Max of nodessegment 30Max of nodes for network 90
Transmission Speed 10 MbpsIEEE specifications 8023
Interference High resistant
10-Base T
Information Category Specifications
Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance
Topology StarCable Type UTP
Connector Type RJ-45
Access Method CSMACDMax Segment Length 100 m (328 ft)
Max Total Network Length NA
Max length between nodes 25 m (8 ft)
Max of connected Segments 1024Max of nodessegment 1
Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
100-Base T LAN
Information Category Specifications
Advantages Fast simple to connect and easy troubleshoot
Disadvantages Limited distance expensiveTopology Star
Cable Type UTP Cat 3-5
Connector Type RJ-45Access Method CSMACD
Max Segment Length 100 m (328 ft)
Max Total Network Length NAMax length between nodes 25 m (8 ft)
Max of connected Segments1024
Max of nodessegment 1Max of nodes for network 1024
Transmission Speed 10 MbpsIEEE specifications 8023
Interference Low resistant
10-Base F LAN
Information Category Specifications
Advantages Fast and long distances
Disadvantages Very expensive and difficult to install
Topology StarCable Type Fiber optic
Connector Type SpecializedAccess Method CSMACD
Max Segment Length 2000 m (6561 ft)
Max Total Network Length NAMax length between nodes NA
Max of connected Segments1024
Max of nodessegment 1
Max of nodes for network 1024Transmission Speed 10 Mbps
IEEE specifications 8023
Interference Immune to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring
Its logically token-ring topology but physically wired as a star topology
Token Ring LAN
Information Category Specifications
Advantages Fast and reliable
Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot
Topology Star-wired ring
Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A
Access Method Token Passing
Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA
Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs
Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP
Transmission Speed 4 or 16 Mbps
IEEE specifications 8025Interference Low resistant
Beaconing
Is the process where computers on a token-ring network detect a problem and
attempt to fix it
FDDI (Fiber Distributed Data Interface)
Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps
It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Token Ring LAN
Information Category Specifications
Advantages Very fast and reliable long distances high secure
Disadvantages More expensive and difficult to installTopology Ring
Cable Type Fiber optic
Connector Type SpecializedAccess Method Token Passing
Max Segment Length NA
Max Total Network Length 100 kmMax length between nodes NA
Max of connectedSegments NA
Max of nodessegment NAMax of nodes for network 500
Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95
Interference Resistant to EMI
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
V INTERNETWORKING
Hierarchy of Networks
1 End system (ES) is a network device that does not perform routing or other traffic
forwarding functions Typical ESs include such devices as terminals PCs and printers
2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges
Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems
3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems
4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and
an AS is also known as a domain
Typical
Network
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Connection-oriented Vs Connectionless Network
Connection-oriented
It involves three phases connection establishment- a single path between the
source and the destination systems is determined data transfer ndash transmitted sequentially
over the path that has been established and connection termination ndash termination of paththat has been establish
Connectionless
Offers two important advantages over connection-oriented service dynamic path
selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently
because network resources are not allocated a bandwidth that they will not use
Virtual Circuits
Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when
transmission is completed It has three phases circuit establishment data transfer and
circuit termination
Permanent Virtual Circuit
A permanently established virtual circuit consists of one mode the data transfer
Internetworking Devices
Hubs
bull A hub is a central network device that connects network devices in a startopology
bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet
frame relay and ATM networks
bull It is also referred to as a concentrator (or switch) which is a device that can
have multiple inputs and outputs all active at a one time
bull Services offered by hubs
bull Provide a central unit from which to connect multiple nodes into one network
bull Permit large numbers of computers to be connected on single or multipleLANs
bull Reduce network congestion through centralizing network design
bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity
bull Consolidate the network backbone
bull Enable high-speed communications
bull Provide connections for several different media types
bull Enable centralized network management
Multiplexers
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 2947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Multiplexers are network devices that can receive multiple inputs and transmit
them to a shared network medium
bull A multiplexer is a switch that divides a communication medium into multiple
channels so several nodes can communicate at the same time
bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the
following
Telephone switching
Switching telecommunications lines to create multiple channels on a
single line Serial communications to enable more than one terminal to
communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking
technologies to create multiple communication channels over a single
communications cable
bull Work at the OSI physical level switching from channel to channel using one
of three physical methods
bull Time division multiplexing (TDM)
bull Frequency division multiplexing (FDM)
bull Wavelength division multiplexing (WDM)
Bridges
A bridge is a network device that connects different LAN segments using the same accessmethod
Bridges are used to
bull To extend a LAN when the maximum connections limit has been reached
bull To extend a LAN beyond the length limit
bull To segment LANs to reduce data traffic bottlenecks
bull To prevent unauthorized access to LAN (for security)
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Routers
Routers can connect networks that have dissimilar data links
A router forwarding a packet to the right network
It forwards packets to networks by using a decision-making process based on
bull Routing table data
bull Discovery of the most efficient routes
bull Preprogrammed information from the network administrator
How routers are used
bull To efficiently direct packets from one network to another reducing excessive
traffic
bull To join neighboring or distant networksbull To connect dissimilar networks
bull To prevent network bottlenecks by isolating portions of network
bull To secure portions of a network from intruders
Switching
Is a method by which multiple communication devices are connected tp oneanother efficiently
Switch
An intermediary hardwaresoftware that links devices together temporarily
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Types of Switching
Circuit Switching
Packets from a single device travel on dedicated link to the destination
Temporary connection usually used for voice communications
Sender
Receiver
A
B
C
D
A B C D
Connection
Propagation
Data
Finish
Return Si nal
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Message Switching
Also known as store and forward switching a node receives a message store itand then send it
Receiver
A
B
C
D
A B C D
Processin Dela
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Packet Switching
Generally more efficient than circuit switching for nonvoice communication
Sender
Receiver
A
B
C
D
A B C D
Processing Delay
Header
Data
Finish
Start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIMODEMS amp INTERFACES
Interfaces
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
DTE-DCE INTERFACE
DTE- Data TerminalTerminating Equipment
bull Any device that serves as source or destination for binary digital data
DCE-Data Circuit-terminatingCommunicating Equipment
bull Any device that transmits or receives data in the form of an analog or
digital signal through a network
Development of DTE-DCE Standards
bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of
the connection
bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X
series The EIA standards are the following
EIA-232 Interface
Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has
revised several times the recent is the EIA-232D defines not only the type of connectors
to be used but also the specific cable and plugs and the functionality of each pin
Mechanical Specification
bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached
to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)
bull Male connector refers to a plug with each wire in the cable connecting to a
pin bull Female connector refers to a receptacle with each wire in the cable
connecting to a metal tube or sheath
bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12
on the bottom
Electrical Specification
bull Defines the voltage levels and the type of signal to be transmitted in either
direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using
non-return to zero level encoding with 0 defined as a positive voltage and 1
defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is
less than -3 volts and ON is greater than 3 volts
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Functional Specification
bull Defines the function of each pin in the connector
Other Concerns
bull Null modem
bull Crossing connectionsbull Other differences
EIA-449 Interface
Mechanical Specification
bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins
Functional Specification
bull Defines the function of each pin in the connector
bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed
from DB-37
Category I Pins
bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called
send timing And both pins 6 and 24 are called receive data Even more
interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position
Category II Pins
Local loopback Pin 10 is used for local loopback testing
Remote loopback Pin 14 is used for remote loopback testing
Select frequency Pin 16 is used to choose between two different frequency rates
Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE
Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational
Select standby Pin 32 allows the DTE to request the use of standby equipment in the
event of failure
New signal Pin 34 is available for multiple point applications where a primary DTE
controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3747
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Standby indicator Pin 36 provides the confirmation signal from the DCE in response to
select standby (pin 32)
Send common Pin 37 provides a common signal return line for unbalanced circuits from
the DTE to the DCE
Electrical Specifications
bull EIA 449 uses two other standards to define its electrical specifications
RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)
RS-423 Unbalanced Mode
bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return
(or ground) to complete the circuit
RS-422 Balanced Mode
bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)
for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data
rate to distance is much higher that that of the unbalanced standard or of
EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry
identical signals The signal on one line is the complement of the signal
on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver
detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and
improves performance
EIA-530
bull A version of EIA-449 that uses DB-25 pins
bull The pin functions of EIA-530 are essentially the same of EIA-449
Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal
quality detector and data signal rate selector
X21
bull Is an interface standard designed by ITU-T to address many problems
existing in the EIA interfaces and at the same time paves the way for alldigital communications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3847
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Using Data Circuits for Control
bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as
separate signals With a separate line control information is represented
only by positive and negative voltages But if control signals are encoded
using a meaningful control characters from a system such as ASCII it can be transmitted over data lines
bull X21 eliminates most of the control circuits of the EIA standards and
instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added
circuit logic that enables them to transform the control codes into bit
streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt
bull Design of X21 allows not only to use fewer pins but also to be used in
digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE
bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and
digital interfaces such as ISDN and X25
Byte Timing
bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA
standards By adding a byte timing pulse improves the overall
synchronization of transmissions
Control and indication
bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or
agreement to begin transmitting Pin 3 is the equivalent of request to send
Pin 5 is the equivalent of clear to send
MODEMbull Modem stands for modulatordemodulator
bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal
bull The series of 1s and 0s are transformed through the mechanism of ASK
FSK PSK and QAM
Transmission Rate
Bandwidth
bull Every line has upper limit and a lower limit on the frequencies of the
signals it carry this limited range is called the bandwidth
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 3947
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
Modem Speed
Type of digital to analog encoding used in Modems
ASK-manipulates the amplitude
FSK-manipulates the frequency
PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase
Theoretical Bit Rate of Modems
Encoding Half Duplex Full Duplex
ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400
8-PSK8-QAM 7200 3600
16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000
64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400
256-PSK256-QAM 19200 9600
Modem Standards
Bell Modems
Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation
Bell 103 FDX 300 baud 300 bps 2-wire FSK
Bell 202 HDX 1200 baud 1200 bps 2-wire FSK
Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK
Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK
Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM
ITU-T Modems
Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation
V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM
V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)
V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM
V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM
V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4047
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VII ISDN
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A technology that incorporates all communication connections in a home or
building into a single interface providing all services such as voice data image facsimile
and so onA circuit-switched networks an evolving communications network standard that
provides universal end-to-end connectivity over digital links
ISDN Services Three Categories
Bearer Services
Provide means to transfer information (voice data and video) between users
without the network manipulating the content of that information it belongs to the first
three layers of OSI model
TeleservicesThe network may change or process the contents of the data these services
correspond to layer 4 to 7 of the OSI model
Supplementary Services
Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services
Channel
Channel Data Rate (kbps)
B 64
D 16 64H 384 1536 1920
B Channel
Bearer channel is the basic user channel and can carry any type of digital
information in full duplex mode that doesnrsquot exceed to 64 kbps
D Channel
Data channel is for control of B channels low-rate data transfer and otherapplications
H ChannelHybrid channel is for high-data-rate applications
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4147
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
User Interfaces
BRI Basic rate interface
Is a digital pipe composed of two B channels and one D channel
Data rate of 192 Kbps (4000 framessec 48 bitsframe)
PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel
Data rate of 1544 Mbps (8000 framessec 193 bitsframe)
ISDN Three Functional Groupings of Equipment
1 Network terminations (NT)
Two types of network terminations
a NT1-equipment that controls the physical and electrical termination of the
ISDN at the userrsquos premises
b NT2-equipment that performs functions related to layers one through three ofthe OSI model
2 Terminal equipment (TE)
Classifications of Terminal Equipment
a TE1-subscriber equipment conforming to ISDN standards
b TE2-subscriber equipment that does not conform to ISDN standards
3 Terminal adapters (TA)-converts data from TE2s to ISDN format
Broadband ISDN (B-ISDN)
Using fiber-optic media fulfills the needs of users who require a higher data rate
that offered by ISDN It has a data rate of 600 Mbps
B-ISDN Two services
1 Interactive- two way services (two subscribers or a subscriber-service provider pair)
2 Distributive-one way service from service provider to subscriber
B-ISDN Three Access Methods
1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex
3 622080 Mbps full duplex
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4247
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
VIII X25FRAME RELAYATM
X25 TECHNOLOGY
bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE
bull A protocol specifies three layers that correspond to the OSI model
1 Physical layer
2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer
It handles connection establishment and termination data transfer
and packet creation protocols Two types of PLP packets information and control
Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages
FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is
specified for the physical layer the choice is up to the user
bull Eliminates the extensive error checking necessary in X25 protocol
bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets
are switched
bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)
bull A switch in frame relay performs error checking and routing Error correction is
left to the other protocols at the higher layers
bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address
field of the frame
bull
ASYNCHRONOUS TRANSFER MODE (ATM)
bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T
bull In ATM some software functions have moved to hardware this can
increase the data rate
Terms
Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay
and other problems associated with multiplexing different sized packets are avoided
A cell network is based on permanent virtual circuit (PVC) routing
bull Virtual Path Identifier (VPI) specifies the path a cell should take
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4347
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
bull Virtual Channel Identifier (VCI) specifies the channel a cell should take
bull User Network Interface (UNI) is the interface between the user and the wide
area ATM network
bull Network-to-Network Interface (NNI) is the interface between two wide area
ATM networks
ATM Standard Defines Three Layers
1 Application adaptation layer (AAL) accepts transmissions from upper layer services
and maps them into ATM cells
2 ATM layer provides routing traffic management switching and multiplexing
services It has 5-byte header to be added to each 48 byte segment
3 Physical layer defines the transmission medium bit transmission encoding and
electrical to optical specifications
Two Sublayers of AAL
1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the
sending station performs the opposite function at the receiving station
2 Segmentation and reassembly (SAR) at the sending station segments the bit stream
into same-sized packets adds headers and trailers performs the opposite function at thereceiving station
Four Different AAL for specific data type
1 AAL1- constant bit-rate stream
2 AAL2- variable bit-rate stream
3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)
4 AAL5- packets requiring no information from the SAR layer
ATM Switches provide both switching and multiplexing
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4447
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
ATM Two Types of Switching
1 Virtual path (VP) switching ndash channels within each VP remain with the VP
2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into
another VP
IXSDHSONET
Synchronous Optical Network (SONET)
Developed by ANSI
Synchronous Digital Hierarchy (SDH)
Developed by ITU-T
SONETSDH
The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible
Is a synchronous network a single clock is used to handle the timing of
transmissions and equipment across the entire network
SONET
It defines the hierarchy of signals called synchronous transport signals (STS)
Optical carrier (OC) levels are the implementation of STS
SONETSDH Rates
STS OC Rate (Mbps) STM
STS-1 OC-1 5184
STS-3 OC-3 15552 STM-1
STS-9 OC-9 46656 STM-3
STS-12 OC-12 62208 STM-4
STS-18 OC-18 93312 STM-6
STS-24 OC-24 124416 STM-8
STS-36 OC-36 186623 STM-12
STS-48 OC-48 248832 STM-16
STS-96 OC-96 497664 STM-32
STS-192 OC-192 995328 STM-64
STM-synchronous transport module
SONET Four Layers
1 Photonic layer is the lowest and performs physical layer activities
A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)
2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the
transmission path
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4547
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
SONET Equipment
1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal
3 Adddrop multiplexer adds STS signals from different paths and removes STS signal
from a path
XTCPIP
Transmission Control ProtocolInternetworking Protocol (TCPIP)
Is a set of rules and procedures that governs the exchange of messages in an
internetwork Originally developed as a protocol for networks that wanted to be connected to
ARPANET a US Department of Defense project now known as Internet
Is a five-layer protocol suite whose bottom four layers match the OSI model fairly
closely The highest level the application layer corresponds to OSIrsquos top threelayers
Internet Protocol (IP) Is defined at the network layer
Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique
number to be included in any packet sent out of the network onto the internet
IP packet is known as datagram consists of a variable header and a variable data
field
IP Address
Uniquely defines the connection of a host to its network The host with more than
one IP address is multi-homed host
IP Addressing
32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node
Network ndash identifier of particular network on the internet
Host ndash identifier of a particular device which can be a server or a
workstations
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4647
DATA COMMUNICATIONS
Engr Marlyn Quiambao-CamingalECE
IP Address Classifications
Classes Format Application
High order
bits Address range
Max No
of Host
A NHHH Few large size org 0 1000 - 126000 16777214
B NNHH Medium size org 10 128100-19125400 65543
C NNNHRelatively smallorg 110 192010-2232552540 245
D NA Multicast 1110 224000-239255255255 NA
E NA Experimental 1111 240000-254255255255 NA
Other Protocols
1 Address Resolution Protocol (ARP)
Finds the physical address of a device if its IP address is known
2 Reverse Address Resolution Protocol (RARP)
Find the hostrsquos IP address from its physical address
3 Internet Control Message Protocol (ICMP)
Handles control and error messages in the IP layer
4 Protocol Port
Is a source or destination point of an executing program in the application layer
Transport Level Two Protocols
1 User Datagram Protocol (UDP)
Unreliable and connectionless
Communication is also port-to-portUDP packet is known as datagram
2 Transport Control Protocol (TCP)
Is reliable and connection-oriented
Communication is also port-to-portTCP packet is known as segment
Application Layer Protocols
Telnet a remote login application is a client-server application using TCPIP
Trivial File Transfer Protocol (TFTP) uses UDP for file transfer
File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for
data) for file transfer
Network File System (NFS) is an application available on TCPIP that allows file access
and manipulation on a remote system
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd
7172019 EST_Data Communication Lecture
httpslidepdfcomreaderfullestdata-communication-lecture 4747
DATA COMMUNICATIONS
Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on
TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept
Simple Network Management Protocol (SNMP) is an application on TCPIP used to
monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome
Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW
Terms
Gopher is a menu-driven file retrieval method The user sorts through menus to find the
files needed
Archie is an automated title-searched application program
Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field
Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds
World Wide Web (www) consists of information repositories located all over the world
that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of
pointers
Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www
Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages
A dynamic web document is created by a server at a browser request
Common gateway interface (CGI) is a standard for building dynamic web documents
Active document is a copy of a program retrieved by the client and run at the client site
Java is a technology and a language that enables the running of an active document
ldquoWinners are made not bornhellip
A winner makes it happen a loser lets it happenrdquo
God bless on your examEnd