Академический Документы
Профессиональный Документы
Культура Документы
MODULE 1
1. Introduction:
1.1 Data Communications
1.2 Networks
1.3 Network Types
1.4 Internet History
1.5 Standards and Administration
2. Networks Models:
2.1 Protocol Layering
2.2 TCP/IP Protocol suite
2.3 The OSI model
3. Introduction to Physical Layer:
3.1 Data and Signals
3.2 Digital Signals
3.3 Transmission Impairment
3.4 Data Rate limits
3.5 Performance
4. Digital Transmission:
4.1 Digital to digital conversion
(Only Line coding: Polar, Bipolar and Manchester coding)
***************************************************************************
The term telecommunication, which includes telephony, telegraphy and television, means
communication at a distance (tele is Greek for "far").
The word data refers to information presented in whatever form is agreed upon by the
parties creating and using the data.
Definition: Data Communications are exchange of data between two devices via some
form of transmission medium such as a wire cable. For data communication to occur, the
communicating devices must be part of a communication system made up of a
combination of hardware (physical equipment) and software (programs).
The effectiveness of a data communications system depends on four fundamental
characteristics:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 1
17CS46 DATA COMMUNICATIONS
Delivery
Accuracy
Timeliness
Jitter
Delivery: The system must deliver data to the correct destination. Data must be
received by the intended (proposed) device or user and only by that device or user.
Accuracy: The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as they
are produced, in the same order that they are produced and without significant delay.
This kind of delivery is called real-time transmission.
Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in
the delivery of audio or video packets.
For example, let us assume that video packets are sent every 30ms. If some of the
packets arrive with 30ms delay and others with 40ms delay, an uneven quality in the
video is the result.
1.1.1 Components:
A data communications system has five components as shown in below Figure 1.1. They
are
1. Message
2. Sender
3. Receiver
4. Transmission Medium
5. Protocol
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 2
17CS46 DATA COMMUNICATIONS
Information today comes in different forms such as text, numbers, images, audio, and video.
Text: In data communications, text is represented as a bit pattern, a sequence of bits (0s
or 1s). Different sets of bit patterns have been designed to represent text symbols.
Each set is called a code, and the process of representing symbols is called coding.
The popular coding schemes are ASCII (American Standard Code for Information
Interchange) and Unicode.
Numbers: Numbers are also represented by bit patterns. A code such as ASCII is not
used to represent numbers; the number is directly converted to a binary number to simplify
mathematical operations.
Images: Images are also represented by bit patterns. An image is composed of a matrix
of pixels (picture elements), where each pixel is a small dot. The size of the pixel depends
upon number of pixels ( also called resolution).
For example, an image can be divided into 1000 pixels or 10,000 pixels. After an image is
divided into pixels, each pixel is assigned a bit pattern.
2. Color Image
Black and White Images: If an image is black and white, each pixel can be represented
by a value either 0 or 1. For example, Chessboard.
Color Image: There are several methods to represent color images. One method is called
RGB, each color is made of a combination of three primary colors: Red, Green and Blue.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 3
17CS46 DATA COMMUNICATIONS
Another method is called YCM, in which a color is made of a combination of three other
primary colors: Yellow, Cyan and Magenta.
Video: Video refers to the recording or broadcasting of a picture or movie. Video can
either be produced as a continuous entity (e.g., by a TV camera), or it can be a
combination of images, each a discrete entity, arranged to convey the idea of motion.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 4
17CS46 DATA COMMUNICATIONS
Example: Keyboards and traditional monitors. The keyboard can only introduce
input; the monitor can only accept output.
Half-Duplex: In half-duplex mode, each station can both transmit and receive, but not
at the same time (it is like a one lane road with 2 directional traffic). When one device
is sending, the other can only receive, and vice versa.
Full-Duplex: In full-duplex mode (also called duplex mode), both stations can
transmit and receive at the same time (or simultaneously) (it is like a 2 way street with
traffic flowing in both directions at the same time).
In full-duplex mode, the entire capacity of a channel is shared by both the stations that
are transmitting the data.
Example: Telephone network. (Both can talk and listen at the same time)
1.2 NETWORKS:
1. Performance
2. Reliability
3. Security
Performance: Performance can be measured in many ways, including transit time and
response time.
Transit time is the amount of time required for a message to travel from one device to
another.
Response time is the elapsed time between an inquiry and a response.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 5
17CS46 DATA COMMUNICATIONS
Security: Security refers to the protection of data from the unauthorized access or damage.
It also involves implementing policies for recovery from data-losses.
Type of Connection: A network is two or more devices connected through links. A link is a
communications pathway that transfer data from one device to another.
There are two possible types of connections: Point-to-Point connection and Multipoint
connection as shown in below Figure 1.3.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 6
17CS46 DATA COMMUNICATIONS
Example: When you change television channels by infrared remote control, you are
establishing a point-to-point connection between the remote control and the television's
control system.
Multipoint: A multipoint connection (also called multidrop) is one in which more than
two specific devices share a single link.
In a multipoint environment, the capacity of the channel is shared, either spatially or
temporally. If several devices can use the link simultaneously, it is a spatially shared
connection. If users must take turns, it is a timeshared (or temporal) connection.
Physical Topology (or Network Topology): The term physical topology refers to the way
in which a network is laid out physically. Two or more devices connect to a link; two or more
links form a topology.
Categories of Topology: There are four basic topologies possible: mesh, star, bus and ring
as shown in below figure 1.4
Mesh Topology:
Figure 1.5: A fully Connected Mesh Topology (Five Devices) (n=5 & 10 links)
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 7
17CS46 DATA COMMUNICATIONS
In a mesh topology, every device has a dedicated point-to-point link to every other
device. The term dedicated means that the link carries traffic only between the two
devices it connects.
To find the number of physical links in a fully connected mesh network with n nodes,
we first consider that each node must be connected to every other node. Node 1 must
be connected to n - 1 nodes, Node 2 must be connected to n – 1 nodes, and finally
Node n must be connected to n - 1 nodes. We need n (n - 1) physical links.
To accommodate that many links every device on the network must have (n-1)
input/output (I/O) ports to be connected to the other (n-1) stations.
Advantages:
1. Congestion reduced: Each connection can carry its own data load.
2. Robustness: If one link fails, it does not affect the entire system.
3. Security: When a data travels on a dedicated-line, only intended-receiver can see the data.
4. Easy fault identification and fault isolation: Traffic can be re-routed to avoid problematic
links.
Disadvantages:
Problem: Assume that five devices are connected on a mesh topology. How many physical
links and duplex links are needed? How many ports are needed for each?
Solution:
Given Data: (No. of Devices Connected) n = 5
Physical Links = n (n-1) = 5 (5-1) = 20
Duplex Links = n (n-1) / 2 = 5 (5-1) / 2 = 10
I/O Ports are needed for each = (n-1) = (5-1) = 4
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 8
17CS46 DATA COMMUNICATIONS
Star Topology:
In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another.
Therefore there is no direct traffic between devices.
The controller acts as an exchange: If one device wants to send data to another, it
sends the data to the controller, then the controller sends the data to the other
connected device.
Advantages:
Less expensive: Each device needs only one link & one I/O port to connect it to any
devices.
Easy installation and reconfiguration: Nodes can be added/removed without affecting the
network.
Robustness: If one link fails, it does not affect the entire system.
Easy to detect and troubleshoot fault.
Centralized management: The hub manages and controls the whole network.
Disadvantages:
Single point of failure: If the hub goes down, the whole network is dead.
Cable length required is the more compared to bus/ring topologies.
Number of nodes in network depends on capacity of hub.
Bus Topology:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 9
17CS46 DATA COMMUNICATIONS
All the devices are connected to the single cable called Bus (Figure 1.7). Every device
communicates with the other device through this bus.
A data from the source is broadcasted to all devices connected to the bus. Only the
intended-receiver, whose physical-address matches, accepts the data.
Devices are connected to the bus by drop-lines and taps.
A drop-line is a connection running between the device and the bus. A tap is a connector
that links to the bus
Advantages:
Easy installation.
Cable required is the least compared to mesh/star topologies.
Redundancy is eliminated.
Costs less (Compared to mesh/star topologies).
Mostly used in small networks. Good for LAN.
Disadvantages:
Ring Topology:
In a ring topology, each device has a dedicated point-to-point connection with only
the two devices on either side of it.
A signal is passed along the ring in one direction, from device to device, until it
reaches its destination.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 10
17CS46 DATA COMMUNICATIONS
Each device in the ring incorporates a repeater. When a device receives a signal
intended for another device, its repeater regenerates the bits and passes them along.
Advantages:
Disadvantages:
Unidirectional traffic.
A fault in the ring/device stops all transmission.
There is a limit on Cable length and Number of nodes that can be connected.
Slower: Each data must pass through all the devices between source and destination.
Figure 1.9: A Hybrid Topology: A Star Backbone with Three Bus Networks.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 11
17CS46 DATA COMMUNICATIONS
LAN is used to connect computers in a single office, building or campus (Figure 1.10).
LAN is usually privately owned network.
Each host in a LAN has an address that uniquely defines the host in the LAN. A packet
sent by a host to another host carries both source host’s and destination host’s addresses.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 12
17CS46 DATA COMMUNICATIONS
In the Past, all hosts in a network were connected through a common cable, which meant
that a packet from one host to another was received by all hosts. The intended recipient
kept the packet, the others dropped the packet.
Today, most LAN’s use a smart connecting switch which is able recognize the destination
address of the packet and guide the packet to its destination without sending it to all other
hosts.
Advantages:
Resource Sharing: Computer resources like printers and hard disks can be shared by all
devices on the network.
Expansion: Nowadays, LANs are connected to WANs to create communication at a wider
level.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 13
17CS46 DATA COMMUNICATIONS
A switched WAN is a network with more than two ends. The switched WAN can be the
backbones that connect the Internet. A switched WAN is a combination of several point-to-
point WANs that are connected by switches (Figure 1.12).
A metropolitan area network (MAN) is a network with a size between a LAN and a
WAN. It normally covers the area inside a town or a city.
It is designed for customers who need high speed connectivity, normally to the Internet,
and have endpoints spread over a city or part of city.
A good example of a MAN is the part of the telephone company network that can provide
a high-speed DSL (Digital Subscriber Line) line to the customer.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 14
17CS46 DATA COMMUNICATIONS
1.3.4 Internetwork:
A network of networks is called an internet. (Internet : inter - network) (Figure 1.14).
For example (Figure 1.13): Assume that an organization has two offices, First office is on
the east coast and Second office is on the west coast.
Figure 1.13: An internetwork made of two LANs and one point-to-point WAN
Each office has a LAN that allows all employees in the office to communicate with each
other. To allow communication between employees at different offices, the management
leases a point-to-point dedicated WAN from a ISP and connects the two LANs. (ISP: Internet
service provider such as a telephone company ex: BSNL).
Two Scenarios
1. When a host in the west coast office sends a message to another host in the same office,
the router blocks the message, but the switch directs the message to the destination.
2. On the other hand, when a host on the west coast sends a message to a host on the east
coast, router R1 routes the packet to router R2 and the packet reaches the destination.
Figure 1.14: A heterogeneous network made of four WANs and three LANs.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 15
17CS46 DATA COMMUNICATIONS
1.3.5 Switching:
An internet is a switched network in which a switch connects at least two links together. A
switch needs to forward data from a network to another network when required.
Two types of switched networks are
1) Circuit-Switched Network
2) Packet-Switched Network
1) Circuit-Switched Network: A dedicated connection, called a circuit, is always available
between the two end systems. The switch can only make it active or inactive.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 16
17CS46 DATA COMMUNICATIONS
As shown in Figure 1.16, the 4 computers at each side are connected to a router.
A router has a queue that can store and forward the packet.
The high-capacity line has twice the capacity of the low-capacity line.
If only 2 computers (one at each site) need to communicate with each other, there is no
waiting for the packets.
However, if packets arrive at one router when high-capacity line is at its full capacity, the
packets should be stored and forwarded.
Advantages
A packet-switched network is more efficient than a circuit switched network.
Disadvantage
The packets may encounter some delays.
Internet is made up of
1) Backbones
2) Provider networks and 3) Customer networks
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 17
17CS46 DATA COMMUNICATIONS
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 18
17CS46 DATA COMMUNICATIONS
The speed varies depending on the number of neighbors that use the same cable.
3) Using Wireless Networks
A residence can use a combination of wireless and wired connections to access the
Internet.
A residence can be connected to the Internet through a wireless WAN.
4) Direct Connection to the Internet
A large organization can itself become a local ISP and be connected to the Internet.
The organization leases a high-speed WANs from a carrier provider and connects itself to
a regional ISP.
Computers from different manufacturers were unable to communicate with one another.
The ARPA (Advanced Research Projects Agency) in the Department of Defense was
interested in finding a way to connect computers so that researchers can exchange their
information.
Somewhere in 1967, ARPA presented its ideas for ARPANET, a small network of
connected computers.
The idea was that each host computer would be attached to a specialized computer
called an Interface Message Processor (IMP). The IMPs in turn would be connected
to one another.
Each IMP had to be able to communicate with other IMPs as well as with its own
attached host.
Finally in 1969, ARPANET was a reality. i.e., some universities were connected together
via IMPs to form a network. The software called Network Control Protocol (NCP)
provided communication between the hosts.
Later different papers outlined the protocols to achieve end-to-end delivery of packets.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 19
17CS46 DATA COMMUNICATIONS
Definition: A protocol is a set of rules that govern data communications. A protocol defines
what is communicated, how it is communicated and when it is communicated.
Syntax: The term syntax refers to the structure or format of the data, meaning the order in
which they are presented.
For example, a simple protocol might expect the first 8 bits of data to be the address of
the sender, the second 8 bits to be the address of the receiver, and the rest of the stream to
be the message itself.
Semantics: The word semantics refers to the meaning of each section of bits. How is a
particular pattern to be interpreted, and what action is to be taken based on that
interpretation?
For example, does an address identify the route to be taken or the final destination of the
message?
Maturity Levels:
• An RFC, during its lifetime, falls into one of 6 maturity levels (Figure 1.18).
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 20
17CS46 DATA COMMUNICATIONS
2) Draft Standard: A proposed standard is elevated to draft standard status after at least 2
successful independent and interoperable implementations.
3) Internet Standard: A draft standard reaches Internet standard status after demonstrations
of successful implementation.
4) Historic: The historic RFCs are significant from a historical perspective. They either have
been superseded by later specifications or have never passed the necessary maturity levels to
become an Internet standard.
5) Experimental: An RFC classified as experimental describes work related to an
experimental situation. Such an RFC should not be implemented in any functional Internet
service.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 21
17CS46 DATA COMMUNICATIONS
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 22
17CS46 DATA COMMUNICATIONS
2. NETWORK MODELS
2.1 PROTOCOL LAYERING
A protocol defines the rules that both the sender and receiver and all intermediate devices
need to follow to be able to communicate effectively.
When communication is simple, we may need only one simple protocol.
When communication is complex, we need to divide the task b/w different layers. We
need a protocol at each layer, or protocol layering.
Scenarios
First Scenario:
In the first scenario,
Communication is so simple that it can occur in only one layer (Figure 2.1).
Assume Maria and Ann is neighbors with a lot of common ideas.
Communication between Maria and Ann takes place in one layer, face to face, in the same
language
Maria and Ann communicate using regular mail through the post office (Figure 2.2).
However, they do not want their ideas to be revealed by other people if the letters are
intercepted.
They agree on an encryption/decryption technique.
The sender of the letter encrypts it to make it unreadable by an intruder; the receiver of the
letter decrypts it to get the original letter.
In figure 2.2, let us assume that Maria sends the first letter to Ann. Maria talks to the
machine at the third layer as through the machine is Ann and is listening to her. The third
layer machine listens to what Maria says and creates the Plaintext (a letter in English),
which is passed to the second layer machine. The second layer machine takes the
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 23
17CS46 DATA COMMUNICATIONS
Plaintext, encrypts it and creates the Ciphertext, which is passed to the first layer machine.
The first layer machine, takes the Ciphertext, puts it in an envelope adds the sender and
receiver addresses and mails it.
At Ann side, the first layer machine picks up the letter from Ann’s mail box,
recognizing the letter from Maria by the sender address. The machine takes out the
Ciphertext from the envelope and delivers it to the second layer machine. The second layer
machine decrypts the machine, creates the Plaintext and passes the Plaintext to the third
layer machine. The third layer machine takes the Plaintext and reads it as though Maria is
speaking.
Protocol layering enables us to divide a complex task into several smaller and simpler
tasks.
Modularity means independent layers.
A layer (module) can be defined as a black box with inputs and outputs, without concern
about how inputs are changed to outputs.
If two machines provide the same outputs when given the same inputs, they can replace
each other.
Advantages:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 24
17CS46 DATA COMMUNICATIONS
Disadvantage:
Having a single layer makes the job easier. There is no need for each layer to provide a
service to the upper layer and give service to the lower layer.
1) First Principle
If we want bidirectional communication, we need to make each layer able to perform 2
opposite tasks, one in each direction.
For example, the third layer task is to listen (in one direction) and talk (in the other
direction).
2) Second Principle
The two objects under each layer at both sites should be identical.
For example, the object under layer 3 at both sites should be a plaintext letter.
Logical Connections
We have layer-to-layer communication (Figure 2.3). There is a logical connection at each
layer through which 2 end systems can send the object created from that layer.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 25
17CS46 DATA COMMUNICATIONS
Layered Architecture:
Let us assume that computer A communicates with computer B. As the Figure 2.5 shows, we
have five communicating devices:
1) Source host (Computer A)
2) Link-layer switch in link 1
3) Router
4) Link-layer switch in link 2
5) Destination host (Computer B).
Each device is involved with a set of layers depending on the role of the device in the
internet.
The two hosts are involved in all five layers.
The source host creates a message in the application layer and sends the message down
the layers so that it is physically sent to the destination host.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 26
17CS46 DATA COMMUNICATIONS
The destination host receives the message at the physical layer and then deliver the
message through the other layers to the application layer.
The router is involved in only three layers; there is no transport or application layer. A
router is involved in n combinations of link and physical layers. Where n = number of
links the router is connected to. The reason is that each link may use its own data-link or
physical protocol.
A link-layer switch is involved only in two layers: i) data-link and ii) physical.
Layers in the TCP/IP Protocol Suite
Figure 2.6: Logical connections between layers of the TCP/IP protocol suite.
As shown in the figure 2.6, the duty of the application, transport, and network layers is
end-to-end.
However, the duty of the data-link and physical layers is hop-to-hop. A hop is a host or
router.
The domain of duty of the top three layers is the internet.
The domain of duty of the two lower layers is the link.
In top 3 layers, the data unit should not be changed by any router or link-layer switch.
In bottom 2 layers, the data unit is changed only by the routers, not by the link-layer
switches.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 27
17CS46 DATA COMMUNICATIONS
Identical objects exist between two hops. Because router may fragment the packet at the
network layer and send more packets than received (Figure 2.7).
The link between two hops does not change the object.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 28
17CS46 DATA COMMUNICATIONS
1) IP
IP is the main protocol of the network layer.
IP defines the format and the structure of addresses.
IP is also responsible for routing a packet from its source to its destination.
It is a connection-less & unreliable protocol. Connection-less means there is no connection
setup b/w the sender and the receiver. Unreliable protocol means IP does not make any
guarantee about delivery of the data. Packets may get dropped during transmission.
It provides a best-effort delivery service. Best effort means IP does its best to get the
packet to its destination, but with no guarantees.
IP does not provide following services
Flow control
Error control
Congestion control services.
If an application requires above services, the application should rely (take) only on the
transport layer protocol.
2) ARP
ARP is used to find the physical-address of the node when its Internet-address is known.
Physical address is the 48-bit address that is imprinted on the NIC or LAN card.
Internet address (IP address) is used to uniquely & universally identify a device in the
internet.
3) ICMP
ICMP is used to inform the sender about datagram-problems that occur during transit.
4) IGMP
IGMP is used to send the same message to a group of recipients.
5) DHCP
DHCP is used to get the network-layer address for a host.
Transport Layer
Transport Layer (TL) protocols are responsible for delivery of a message from a process to
another process.
The transport layer gets the message from the application layer encapsulates the message
in a packet called a segment and sends the segment to network layer.
TCP/IP model defines 3 protocols:
1) TCP (Transmission Control Protocol)
2) UDP (User Datagram Protocol)
3) SCTP (Stream Control Transmission Protocol)
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 29
17CS46 DATA COMMUNICATIONS
1) TCP
TCP is a reliable connection-oriented protocol.
A connection is established b/w the sender and receiver before the data can be transmitted.
TCP provides
Flow control
Error control
Congestion control
2) UDP
UDP is the simplest of the 3 transport protocols.
It is an unreliable, connectionless protocol.
It does not provide flow, error, or congestion control.
Each datagram is transported separately & independently.
It is suitable for application program that needs to send short messages and cannot afford
the retransmission.
3) SCTP
SCTP provides support for newer applications such as voice over the Internet.
It combines the best features of UDP and TCP.
Application Layer
The two application layers exchange messages between each other.
Communication at the application layer is between two processes (two programs running
at this layer).
To communicate, a process sends a request to the other process and receives a response.
Process-to-process communication is the duty of the application layer.
TCP/IP model defines following protocols:
SMTP is used to transport email between a source and destination.
TELNET is used for accessing a site remotely.
FTP is used for transferring files from one host to another.
DNS is used to find the IP address of a computer.
SNMP is used to manage the Internet at global and local levels.
HTTP is used for accessing the World Wide Web (WWW).
(FTP: File Transfer Protocol SMTP: Simple Mail Transfer Protocol)
(DNS: Domain Name System HTTP: Hyper Text Transfer Protocol)
(SNMP: Simple Network Management Protocol TELNET: Terminal Network)
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 30
17CS46 DATA COMMUNICATIONS
One of the important concepts in protocol layering in the internet is encapsulation and
decapsulation.
The above figure 2.8 shows this concept for the small internet.
In this figure, we show the encapsulation at the source, encapsulation and decapsulation at
the router and decapsulation at the destination.
A) Encapsulation at the Source Host
At the source, we have only encapsulation (Figure 2.8).
1) At the application layer, the data to be exchanged is referred to as a message.
A message normally does not contain any header or trailer.
The message is passed to the transport layer.
2) The transport layer takes the message as the payload.
TL adds its own header to the payload.
The header contains identifiers of the source and destination application programs
such as information needed for flow, error control, or congestion control.
The transport-layer packet is called the segment (in TCP) and the user datagram (in
UDP).
The segment is passed to the network layer.
3) The network layer takes the transport-layer packet as payload.
NL adds its own header to the payload.
The header contains addresses of the source and destination hosts and some
information used for error checking of the header, fragmentation information and so
on.
The network-layer packet is called a datagram.
The datagram is passed to the data-link layer.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 31
17CS46 DATA COMMUNICATIONS
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 32
17CS46 DATA COMMUNICATIONS
2) At the transport layer, addresses are called port numbers. Port numbers define the
application-layer programs at the source and destination. Port numbers are local addresses
that distinguish between several programs running at the same time (For example: HTTP: 80
(port number), DNS: 53 (port number), TELNET: 23 (port number) and so on).
3) At the network-layer, addresses are called IP addresses. IP address uniquely defines the
connection of a device to the Internet. The IP addresses are global, with the whole Internet as
the scope.
4) At the data link-layer, addresses are called Link-Layer Addresses (MAC addresses).
The MAC addresses defines a specific host or router in a network (LAN or WAN). The MAC
addresses are locally defined addresses.
Multiplexing means a protocol at a layer can encapsulate a packet from several next-
higher layer protocols (one at a time) (Figure 2.10).
Demultiplexing means a protocol can decapsulate and deliver a packet to several next-
higher layer protocols (one at a time).
At transport layer, either UDP or TCP can accept a message from several application-
layer protocols.
At network layer, IP can accept a segment from TCP or a user datagram from UDP. IP
can also accept a packet from other protocols (ICMP or IGMP).
At data-link layer, a frame may carry the payload coming from IP or other protocols
such as (ARP).
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 33
17CS46 DATA COMMUNICATIONS
An ISO standard that covers all aspects of network communications is the Open Systems
Interconnection (OSI) model. It was first introduced in the late 1970s.
An open system is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture.
The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hardware and
software.
The OSI model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust, and interoperable.
“The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems”
Each layer has specific duties to perform and has to co-operate with the layers above and
below it.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 34
17CS46 DATA COMMUNICATIONS
(Note: For description of each layer (except Session and Presentation Layers), same as
TCP/IP protocol suite)
Session Layer
The session layer is responsible for dialog control and synchronization.
The session layer is the network dialog controller. It establishes, maintains, and
synchronizes the interaction among communicating systems.
Other specific responsibilities of the session layer include the following:
Dialog control: The session layer allows two systems to enter into a dialog. It allows the
communication between two processes to take place in either half duplex (one way at a
time) or full-duplex (two ways at a time) mode.
Synchronization: The session layer allows a process to add checkpoints, or
synchronization points, to a stream of data.
Presentation Layer
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 35
17CS46 DATA COMMUNICATIONS
OSI was completed when TCP/IP was fully in place and a lot of time and money had been
spent on the suite; changing it would cost a lot.
Some layers in the OSI model were never fully defined.
When OSI was implemented by an organization in a different application, it did not show
a high enough level of performance.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 36
17CS46 DATA COMMUNICATIONS
For example: Data are stored in computer-memory in the form of 0s and 1s.
1) Periodic Signal
Signals which repeat itself after a fixed time period are called Periodic Signals. The
completion of one full pattern is called a cycle.
2) Nonperiodic Signal
Signals which do not repeat itself after a fixed time period are called Nonperiodic Signals.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 37
17CS46 DATA COMMUNICATIONS
Periodic Analog Signals (Not in Syllabus, but very important for exam)
Periodic analog signals can be classified as simple or composite. A simple periodic analog
signal, a sine wave, cannot be decomposed into simple signals. A composite periodic
analog signal is composed of multiple sine waves.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 38
17CS46 DATA COMMUNICATIONS
Figure 3.4: Two signals with the same Phase and Frequency, but different Amplitudes.
Period and Frequency:
Period (T) refers to the amount of time in seconds, a signal needs to complete 1 cycle.
Frequency (f) refers to the number of periods in 1s.
Note that period and frequency are just one characteristic defined in two ways.
Period is the inverse of Frequency and Frequency is the inverse of Period, as the following
formula show.
f=1/T and T = 1 / f
The below figure 3.5 shows two signals and their frequencies. Periods is formally expressed
in seconds. Frequency is formally expressed in Hertz (HZ), which is cycle per second. Units
of Period and Frequency are shown in Table 3.1.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 39
17CS46 DATA COMMUNICATIONS
Figure 3.5: Two signals with the same Amplitude and Phase, but different Frequencies.
Problem 1:
Problem 2:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 40
17CS46 DATA COMMUNICATIONS
Problem 3:
Note: If a signal does not change at all, its frequency is Zero. If a signal changes
instantaneously, its frequency is Infinite.
Phase:
The term Phase, or phase shift, describe the position of the waveform relative to time 0. If
we think of the wave as something that can be shifted backward or forward along the time
axis, phase describes the amount of that shift. It indicates the status of the First Cycle.
Phase is measured in degrees or radian [ 3600 is 2π rad, 10 is 2 π /360 rad and 1 rad is
360/(2 π)]. A phase shift of 3600corresponds to a shift of a complete period, a phae shift of
1800 corresponds to a shift of one-half of a period and a phase shift of 900 corresponds to a
shift of one-quarter of a period. (Figure 3.6).
Figure 3.6: Three sine wave with the same Amplitude and Frequency, but different Phases.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 41
17CS46 DATA COMMUNICATIONS
A sine wave with a phase of 00 starts at time 0 with a Zero Amplitude. The Amplitude is
increasing.
A sine wave with a phase of 900 starts at time 0 with a Peak Amplitude. The Amplitude
is decreasing.
A sine wave with a phase of 1800 starts at time 0 with a Zero Amplitude. The Amplitude
is decreasing.
Another way to look at the phase is in terms of shift or offset. We can say that
Problem:
The Frequency Domain shows the relationships between Amplitude and Frequency. The
Frequency Domain graph plot is concerned with these parameters (or characteristics).
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 42
17CS46 DATA COMMUNICATIONS
Figure 3.7: The Time Domain and Frequency Domain plots of a sine wave.
Bandwidth:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 43
17CS46 DATA COMMUNICATIONS
Problem:
The spectrum has only five spikes, at 100, 300, 500, 700 and 900 Hz (Figure 3.9)
The spectrum contains all integer frequencies. We show this by a series of spikes (Figure 3.10)
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 44
17CS46 DATA COMMUNICATIONS
Problem:
Figure 3.12: Two digital signals: one with two signal levels and the other with four signal levels.
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 45
17CS46 DATA COMMUNICATIONS
Bit Rate:
The bit rate is the number of bits sent in 1s. The bit rate is expressed in bits per second (bps).
Problem:
Problem:
Problem:
Bit Length:
The bit length is the distance one bit occupies on the transmission medium..
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 46
17CS46 DATA COMMUNICATIONS
Figure 3.13: The time and frequency domains of periodic and Nonperiodic digital signals.
Note that both bandwidth are infinite, but the periodic signal has discrete frequencies while the
Nonperiodic signal has continuous frequencies.
Transmission of Digital Signals:
Two methods for transmitting a digital signal. We can transmit a digital signal by using one of two
different approaches.
1) Baseband transmission
2) Broadband transmission (using Modulation)
Baseband Transmission:
Baseband transmission means sending a digital signal over a channel without changing the
digital signal to an analog signal (Figure 3.14).
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 47
17CS46 DATA COMMUNICATIONS
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 48
17CS46 DATA COMMUNICATIONS
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 49
17CS46 DATA COMMUNICATIONS
Attenuation:
Attenuation means a loss of energy. When a signal, simple or composite, travels through
a medium, it loses some of its energy in overcoming the resistance of the medium (Figure
3.18). The reason is some of the electrical energy in the signal is converted to heat (i.e.,
electrical energy is converted into thermal energy).
As the distance increases, attenuation also increases.
For example: Voice-data becomes weak over the distance and loses its contents beyond a
certain distance.
To compensate for this loss, amplifiers are used to amplify the signal.
Decibel:
The decibel (dB) measures the relative strengths of 2 signals or one signal at 2 different
points.
The decibel is negative if a signal is attenuated. The decibel is positive if a signal is
amplified.
dB = 10 log 10 (P2 / P1)
Where variables P1 and P2 are the powers of a signal at points 1 and 2, respectively. To show
that a signal has lost or gained strength, engineers use the unit of decibel.
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 50
17CS46 DATA COMMUNICATIONS
Problem:
Example:
The below figure 3.19 shows a signal travels from point 1 to point 4. The signal is attenuated
by the time it reaches point 2. Between points 2 and 3, the signal is amplified. Again,
between points 3 and 4, the signal is attenuated. We can find the resultant decibel value for
the signal just by adding the decibel measurements between each set of points.
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 51
17CS46 DATA COMMUNICATIONS
Distortion:
Distortion means that the signal changes its form or shape (Figure 3.20). Distortion can
occur in a composite signal made of different frequencies.
• Each signal-component has its own propagation speed through a medium and therefore, its
own delay in arriving at the final destination.
• Differences in delay create a difference in phase if delay is not same as the period
duration.
• Signal-components at the receiver have phases different from what they had at the sender.
The shape of the composite signal is therefore not the same.
Noise:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 52
17CS46 DATA COMMUNICATIONS
Thermal Noise
Induced Noise
Crosstalk Noise
Impulse Noise
Thermal Noise: It is random motion of electrons in wire which creates extra signal not
originally sent by transmitter.
Induced Noise: Induced noise comes from sources such as motors and appliances. These
devices act as a sending-antenna. The transmission-medium acts as the receiving-antenna.
Crosstalk Noise: Crosstalk is the effect of one wire on the other. One wire acts as a
sending-antenna and the other as the receiving-antenna.
Impulse Noise: Impulse Noise is a spike that comes from power-lines, lightning and so
on. (spike: a signal with high energy in a very short time)
SNR is used to find the theoretical bit-rate limit, we need to know the ratio of the signal
power to the noise power. The Signal-to-Noise Ratio is defined as
SNR is actually the ratio of what is wanted (signal) to what is not wanted (noise). A high-
SNR means the signal is less corrupted by noise. A low-SNR means the signal is more
corrupted by noise. The below figure 3.22 shows the idea of SNR.
Because SNR is the ratio of 2 powers, it is often described in decibel units, SNRdB, defined
as SNRdB = 10 log10 SNR
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 53
17CS46 DATA COMMUNICATIONS
Figure 3.22: Two cases of SNR: a high SNR and a low SNR.
Problem:
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 54
17CS46 DATA COMMUNICATIONS
Problem:
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 55
17CS46 DATA COMMUNICATIONS
Problem:
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 56
17CS46 DATA COMMUNICATIONS
3.5 PEFORMANCE
One important issue in networking is the performance of the network. An overall
measurement of network performance is based on following network performance
parameters.
Bandwidth
Throughput
Latency (or Delay)
Bandwidth-Delay Product
Jitter
Bandwidth:
One characteristic that measures network-performance is bandwidth. Bandwidth of analog
and digital signals is calculated in separate ways:
Bandwidth of an Analog Signal (in Hz)
Bandwidth of a Digital Signal (in bps)
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 57
17CS46 DATA COMMUNICATIONS
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 58
17CS46 DATA COMMUNICATIONS
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 59
17CS46 DATA COMMUNICATIONS
Problem:
Bandwidth-Delay Product:
Two performance-metrics of a link are 1) Bandwidth and 2) Delay
The bandwidth-delay product is very important in data-communications.
Let us elaborate on this issue, using 2 hypothetical cases as examples.
Let us assume,
Bandwidth of the link = 1 bps and Delay of the link = 5s. From the figure 3.3.23, bandwidth-
delay product is 1 x 5 = 5. Thus, there can be maximum 5 bits on the line. There can be no
more than 5 bits at any time on the link.
Let us assume,
Bandwidth of the link = 5 bps and Delay of the link = 5s. From the figure 3.24, bandwidth-
delay product is 5 x 5 = 25. Thus, there can be maximum 25 bits on the line. At each second,
there are 5 bits on the line, thus the duration of each bit is 0.20s.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 60
17CS46 DATA COMMUNICATIONS
The above 2 cases show that the (bandwidth * delay) is the number of bits that can fill the
link. This measurement is important if we need to send data in bursts and wait for the
acknowledgment of each burst.
To use the maximum capability of the link. We need to make the burst-size as (2 * bandwidth
* delay). We need to fill up the full-duplex channel (two directions). Amount (2 * bandwidth
* delay) is the number of bits that can be in transition at any time (Fig 3.24).
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 61
17CS46 DATA COMMUNICATIONS
4. DIGITAL TRANSMISSION
4.1 DIGITAL-TO-DIGITAL CONVERSION
Data can be analog or digital. Signal encoding is the conversion from analog/digital data to
analog/digital signal.
The possible encodings are:
1) Digital data to digital signal
2) Digital data to analog signal
3) Analog data to digital signal
4) Analog data to analog signal
Line Coding:
Line coding is the process of converting digital data to digital signals (Figure 4.1).
The data may be in the form of text, numbers, graphical images, audio, or video
The data are stored in computer memory as sequences of bits (0s or 1s). Line-coding
converts a sequence of bits to a digital-signal.
At the sender, digital-data is encoded into a digital-signal. At the receiver, digital-signal
is decoded into a digital-data.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 62
17CS46 DATA COMMUNICATIONS
where N = data-rate (in bps), c = case factor, which varies for each case, S = number of
signal-elements and r = previously defined factor. This relationship depends on value of r and
data pattern. (If we have a data pattern of all 1s or all 0s, the signal-rate may be different from
a data pattern of alternating 0s and 1s).
Bandwidth:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 63
17CS46 DATA COMMUNICATIONS
The baud rate, not the bit-rate, determines the required bandwidth for a digital-signal.
More changes in the signal mean injecting more frequencies into the signal. (Frequency
means change and change means frequency.)
The bandwidth refers to range of frequencies used for transmitting a signal. Relationship
between baud rate (signal-rate) and the bandwidth (range of frequencies) is given as
Bmin = c * N * (1/r)
where N = data-rate (in bps), c = case factor, which varies for each case,
r = previously defined factor and Bmin = minimum bandwidth.
Baseline Wandering:
Self-Synchronization:
To correctly interpret the signals received from the sender, the receiver's bit intervals must
correspond exactly to the sender's bit intervals.
If the receiver clock is faster or slower, the bit intervals are not matched and the receiver
might misinterpret the signals.
As shown in below figure 4.3, we have a situation where the receiver has shorter bit duration.
The sender sends 10110001, while the receiver receives 110111000011.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 64
17CS46 DATA COMMUNICATIONS
beginning, middle, or end of the pulse. If the receiver’s clock is out-of-synchronization, these
points can reset the clock.
Complexity:
A complex scheme is more costly to implement than a simple one. For example, A scheme
that uses 4 signal-levels is more difficult to interpret than one that uses only 2 levels.
Problem:
Problem:
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 65
17CS46 DATA COMMUNICATIONS
Polar Schemes:
The voltages are on the both sides of the time axis.
Polar NRZ scheme can be implemented with two voltages (V).
For example: Negative Voltage (-V) for bit 1 and Positive Voltage (+V) for bit 0.
Non-Return-to-Zero (NRZ)
We use 2 levels of voltage amplitude.
Two versions of polar NRZ (Figure 4.6):
NRZ - L (NRZ - Level)
NRZ - I (NRZ - Invert)
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 66
17CS46 DATA COMMUNICATIONS
Problem:
Return-to-Zero (RZ):
In NRZ encoding, problem occurs when the sender-clock and receiver-clock are not
synchronized.
Solution: Use return-to-zero (RZ) scheme (Figure 4.7).
RZ scheme uses 3 voltages: positive, negative, and zero.
There is always a transition at the middle of the bit. Either from high to zero (for 1) or
from low to zero (for 0)
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 67
17CS46 DATA COMMUNICATIONS
Disadvantages:
Manchester Encoding
This is a combination of NRZ-L & RZ schemes (RZ: transition at the middle of the bit).
There is always a transition at the middle of the bit. Either from high to low (for 0) or from
low to high (for 1).
It uses only two voltage levels (Figure 4.8).
The duration of the bit is divided into 2 halves.
The voltage remains at one level during the first half and moves to the other level in the
second half.
The transition at the middle of the bit provides synchronization.
Differential Manchester
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 68
17CS46 DATA COMMUNICATIONS
Advantages:
The Manchester scheme overcomes problems associated with NRZ-L. Differential
Manchester overcomes problems associated with NRZ-I.
There is no baseline wandering.
There is no DC component because each bit has a positive & negative voltage
contribution.
Disadvantage:
Signal-rate: Signal-rate for Manchester and differential Manchester is doubles that for NRZ.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 69
17CS46 DATA COMMUNICATIONS
Disadvantage:
AMI has a synchronization problem when a long sequence of 0s is present in the data.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 70
17CS46 DATA COMMUNICATIONS
ASSIGNMENT QUESTION
MODULE 1: INTRODUCTION
1) Define data communications. Explain its 4 fundamental characteristics.
2) Explain different components of data communication system.
3) Explain different forms of information.
4) Describe simplex, half-duplex and full duplex methods of data flow.
5) Explain the 3 criteria necessary for an effective and efficient network.
6) Explain point to point and multipoint connection.
7) Explain the following topologies:
i) Mesh ii) Star iii) Bus iv) Ring
8) Explain in detail LAN & WAN. List the differences between LAN & WAN.
9) Explain circuit-switched and packet-switched networks.
10) Explain components of Internet.
11) Explain different method of accessing the Internet.
12) With respect to RFC, explain the following:
i) Maturity Levels ii) Requirement Levels.
13) What are internet standards? Explain the functions of standard organizations.
14) For n devices in a network, what is the number of cable links required for a mesh, ring,
bus and star topologies.
15) How many point to point WANs are needed to connect n LANs if each LAN should be
able to directly communicate with any other LAN?
MODULE 1 (CONT.): NETWORK MODELS
1) Explain TCP/IP architecture with a layer diagram.
2) List the 5 layers and its functionality in TCP/IP model.
3) With respect to in TCP/IP model, explain the following:
i) Encapsulation and decapsulation. ii) Multiplexing and Demultiplexing.
4) Explain four levels of addressing employed in TCP/IP protocol.
5) What are the uses of a layered network model? Compare OSI and TCP/IP models.
6) Explain OSI model with explanation of each layer.
MODULE 1 (CONT.): DATA AND SIGNALS
1) Compare the following:
i) Analog signal vs. Digital signal. ii) Periodic signal vs. Non-periodic signal.
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 71
17CS46 DATA COMMUNICATIONS
Prepared By: Mr. Gopinath C B, Asst. Prof., Dept. of CS&E, A.I.T, Chikkamagaluru. Page 72