Unit 1 New
Unit 1 New
Networks
(CN)
What is Computer Network ?
❑ It is a digital telecommunications network which
allows nodes to share resources.
❑ Sharing resources:
✓ Software
✓ Files and Data
✓ Storage devices
✓ Printers, Scanners, Fax and Modem
2
3
Course Objectives
1. To introduce the concept, terminologies, and
technologies used in modern data
communication and computer networking and
the functions of different layers.
2. To explain the basics of connecting devices used
and protocols used in data link layer.
3. To understand the basic concepts of addressing
and to study the various routing protocols.
4. To learn how process to process delivery is
carried out in transport layer and basic transport
layer protocols, congestion control techniques
and applications.
4
Course Outcomes
1.Understand the principles of data communication and
networking.
2.Gain knowledge of data link control, which involves flow
and error control.
3.Know two prominent wireless technologies for LANs:
IEEE 802.11 Wireless LANs, and Bluetooth, a technology
for small wireless LANs.
4.Have exposure to principles of addressing and routing.
5.Gain the knowledge of network, transport and application
layer protocols.
6.Introduced to basics of cryptography and internet security.
5
Unit I : Physical Layer
▪ Data Communications, Networks
▪ Networks models: OSI model, Layers in OSI
model, TCP / IP protocol suite, Addressing
▪ Guided and Unguided Transmission media.
▪ Switching: Circuit switched networks, Data
gram Networks, Virtual circuit networks.
▪ Cable networks for Data transmission: Dial-
up modems, DSL, Cable TV, Cable TV for
Data transfer.
6
7
Unit II: Data Link Layer
▪ Data link control: Framing, Flow and
error control, Protocols for Noiseless
and Noisy Channels, HDLC.
▪ Multiple access: Random access and
Controlled access
▪ Wired LANS: Ethernet:- IEEE
standards, standard Ethernet, changes
in the standard, Fast Ethernet, Gigabit
Ethernet.
▪ Introduction to Wireless LANS: IEEE
802.11, Bluetooth.
▪ Connecting LANS: Connecting
devices, Backbone networks, Virtual
LANS
8
Unit III: Network and Transport Layer
▪ Logical addressing: IPv4 and IPv6
addresses.
▪ Internet Protocol: Internetworking,
IPv4, IPv6
▪ Address mapping: ARP, RARP,
BOOTP, DHCP, ICMP, IGMP.
▪ Delivery: Forwarding , Routing,
Unicast, Multicast routing protocols.
▪ TRANSPORT LAYER: Process-to-
Process delivery, User Datagram
Protocol (UDP), Transmission Control
Protocol (TCP).
9
Unit IV: Application Layer and Network
Security
▪ APPLICATION LAYER:
Domain Name System (DNS) ,
E-mail, FTP,
▪ WWW and HTTP Multimedia.
▪ Introduction to Network
Security, Services, Mechanisms
and Attacks, Symmetric Key
Cryptography, Asymmetric Key
Cryptography, Security in the
Internet, Firewalls.
10
List of Experiments
1. Study of Windows Server Operating System &
Implementation of LAN.
2. Installation and configuration of Web & FTP Services.
3. Study of Network Protocol Analyser.
4. Examine how networking packets are transferred and
exchanged in a TCP/IP network.
5. Write a program for implementation of Shortest Path
algorithm.
6. Study of wireless LANs.
7. Write a program for Encryption and Decryption.
11
Learning resources
Text Books:
1. Behrouz A. Forouzan, “Data communication
and Networking”, 4th edition, TMH, 2006
2. Andrew S. Tannenbaum, “Computer
Networks”, Pearson Education, Fourth
Edition, 2003
12
Reference Books:
1. Wayne Tomasi, “Introduction to Data Communication and
Networking”, 1/e, Pearson Education
2. James .F. Kurouse& W. Rouse, “Computer Networking: A
Topdown Approach Featuring”,3/e, Pearson Education.
3. William Stallings, “Cryptography and Network Security
Principles and Practices”, PHI.
4. Greg Tomshon, Ed Tittel, David Johnson. “Guide to
Networking Essentials”, fifth edition, Thomson India
Learning, 2007.
5. William Stallings, “Data and Computer Communication”,
Eighth Edition, Pearson Education, 2000.
13
Assessment Scheme
Class Continuous Assessment (CCA): 50 Marks
Assignments Mid term Test Quizzes
A1 (10M):- U1 & 2 (U 1 & 2) (U 1 to 4)
Each unit: 5M
A2 (10M):- U3 & 4
20M 20 M 20 M
File Practical
exam
30 20
1.15
Fundamental characteristics
(Effective data communications)
❑ Delivery: The system must deliver data to the correct
destination.
❑ Accuracy: The system must deliver the data accurately.
❑ Timeliness: The system must deliver data in a timely manner.
This kind of delivery is called real-time transmission.
✓ Real-time: Audio and Video
• Blockage of channel is not acceptable
✓ Non-real time: E-mail, SMS, WhatsApp
• Blockage of channel is acceptable
❑ Jitter: It refers to the variation in the packet arrival time.
16
Five components of data communication
❑ Wireline:
✓ Telephony: Coaxial cable, Optical fiber cable (OFC)
✓ RF and Microwave : Waveguides
20
Simplex (One-way communication)
21
Half duplex (walkie-talkie)
22
Full duplex
http://bitly.ws/S9vG
23
NETWORKS
❑ A network is a set of devices (or nodes) connected by
communication links (wired or wireless) and capable of
communication.
❑ Examples of devices or nodes:
✓ Large computer
✓ Desktop
✓ Laptop
✓ Cellular phone
✓ Router (which connects the network to other networks)
✓ Switch (which connects devices together)
✓ MODEM (which changes the form of data)
❑ Most networks use distributed processing. It means dividing a
task among multiple computers.
24
Network Criteria
❑ A network must be able to meet a certain number of criteria.
1. Performance
2. Reliability
3. Security
25
1. Performance
❑ It can be measured in many ways, including transit time and
response time.
❑ Factors:
✓ Number of users
✓ Type of transmission medium
✓ Capabilities of the connected hardware
✓ Efficiency of the software
❑ It is often evaluated by two networking metrics: throughput
and delay.
• Expected: more throughput and less delay.
26
Performance
• One important network issue is the
performance of the network. Following are
the important parameters of Performance.
1. Bandwidth
2. Throughput
3. Latency
4. Bandwidth delay product
5. Jitter
Bandwidth
• BW in Hz
Range of Frequencies in composite signal or range
of frequencies a channel can pass.
– e.g. Telephone line BW is 4KHz
– BW in bps
Number of bps that a channel, a link, or even
network can transmit
It refers speed of bit transmission in a channel or
link.
– E.g. BW of Fast Ethernet network is 100 Mbps
Throughput
• It is a measure of how fast we can actually send
data through a network.
• BW and Throughput both are in bps but they are
different
• A link may have BW of B bps, but we can only
send T bps through this link with T always less
than B.
• BW is potential measurement of link and the
throughput is an actual measurement of how fast
we can send data.
• e.g. BW is 2Mbps but throughput is 200Kbps
Latency (delay)
• The latency defines how long it takes for an
entire message to completely arrive at the
destination from the time the first bit is sent
out from the source.
37
❑Security:
• Security is the protection of Hardware, Software and Data
from unauthorized access.
• Implementing policies and procedures for data recovery and
losses.
• Restricted physical access to computers, password protection,
limiting user privileges and data encryption are common
security methods.
• Anti-Virus monitoring programs to defend against computer
viruses are a security measure.
38
Physical Structures
1. Point-to-Point:
▪ Dedicated link between two devices.
▪ The entire capacity of link is reserved between those two
devices.
39
2. Multipoint (or Multidrop)
❑ More than two specific devices share a single link
❑ The capacity of a channel is shared either Spatially
(simultaneously) or Temporally (turn by turn basis)
40
Physical Topology
▪ Physical topology: Physical layout of the network (or
geometrical representation of the links and nodes)
▪ 2 or more devices connect to a link.
▪ 2 or more links form a topology.
41
1. Mesh
❑ Every device has a dedicated point-to-
point link to every other device.
❑ Dedicated: Link carries traffic only
between the two devices it connects.
❑ Physical links: n(n - 1)
❑ Duplex-mode links: {n(n - 1)}/2
❑ Input/output ports: n -1
Example: n = 5
❑ Physical links: 20
❑ Duplex-mode links: 10
❑ Input/output ports: n -1: 4
42
Advantages
43
Disadvantages
44
2. Star
45
Advantages
• Less expensive than a mesh topology.
• Each device needs only one link and I/O
port. Easy installation and
reconfiguration.
• Less cabling is needed.
• Robustness: If one link fails, only that
link is affected. All other links remain
active. Easy fault identification and
isolation.
• Hub working: used to monitor link
problems and bypass defective links.
46
Disadvantages
❑Dependent on hub, If the hub goes down, the whole
system is dead.
❑More cabling is required than Ring or Bus topology.
Application: LANs
47
3. Bus
48
Advantages
• Ease of installation.
• Backbone cable can be laid along the most efficient
path.
• It uses less cabling than Mesh or Star topologies.
49
Disadvantages
51
Advantages
52
Disadvantages
❑ http://bitly.ws/S9Z5
53
Hybrid
54
Categories of Networks
❑ Two primary categories: (based on its length and topology)
1. Local Area Networks (LANs) : < 2miles
2. Wide Area Networks (WANs) : worldwide
3. Metropolitan Area Networks (MANs): 10 miles
❑ Order of sequence: LAN, MAN and WAN
57
58
❑ Early switched WAN : X.25 (Packet-switching)
❑ X.25 is being gradually replaced by Frame relay
(high-speed and more efficient network).
❑ Example of switched WAN:
✓ asynchronous transfer mode (ATM) network (fixed-
size data unit packets called cells).
✓ wireless WAN (more popular).
59
2. MAN
❑ Size: LAN < MAN < WAN.
❑ Where? Town or City.
❑ High-speed connectivity.
❑ Examples:
✓ Telephone Company network ( high-speed DSL line
to the customer).
✓ Cable TV network (high-speed data connection to the
Internet).
60
Heterogeneous Network
61
Internet Service Providers (ISPs)
❑ It allow users access
to networks to
establish Internet connectivity.
❑ Local
❑ Regional
❑ National
❑ International
62
Protocols and Standards
❑Protocols OR Rules
❑Standards: Agreed upon rules
63
Protocols
❑ Key elements of a protocols are:
1. Syntax: Structure or format of the data, meaning in which they
are presented.
✓ Example: Protocol (first 8 bits of the data - address of the
sender, second 8 bits of the data - address of the receiver, and
rest bits are data (or message).
2. Semantics: Meaning (or interpretation) of each section of bits.
3. Timing: When data to be sent and how they can be sent.
✓ Example: Sender - 100 Mbps, Receiver - 1 Mbps.
64
Standards
❑ These are essential in creating and maintaining an open competitive
market for equipment manufactures and in guaranteeing National and
International interoperability of data and telecommunications
technology and processes.
❑ It provide guidelines to manufactures, vendors, government agencies,
and other service providers.
❑ Data communication standards fall into two categories:
1. de facto ( meaning “by fact”)
2. de jure (meaning “ by law” or “by regulation”)
❑ Standards Organizations:
1. International Organization for Standardization (ISO)
2. International Telecommunication Union – Telecommunication (ITU-T)
3. American National Standards Institute (ANSI)
4. Institute of Electrical and Electronics Engineers (IEEE)
5. Electronic Industries Association (EIA)
65
❑ TRAI: Telecom Regularity Authority of India.
❑ FCC: Federal Communications Commission, US govt. agency.
❑ ITU: The International Telecommunication Union is an agency
of the United Nations, coordinate telecommunication operations
and services throughout the world.
66
Network Models
❑ Two models haven been devised to define CN operations.
1. The OSI model – 7 layer n/w (1.Never implemented in
practice, 2. Reference model)
2. The Internet model (TCP/IP) - 5 layer n/w (1. Implemented
in practice, 2. CN syllabus is framed)
67
Protocol Layering
• Simple communication: Only one simple protocol
68
❑ Advantages:
✓ It allows us to separate the services from the implementation.
✓ Internet: Communication does not always use only two end
systems: there are intermediate systems that need only some
layers, but not all layers.
❑ Principles of Protocol Layering:
1. Bi-directional communication at each layer.
2. The two objects under each layer at both sites should be
identical.
69
Logical ( or Imaginary) Connections
between Peer layers
70
The OSI Model
❑ http://bitly.ws/Saiu
❑ http://bitly.ws/SzN5
ISO is the organization.
OSI is the model. 71
7- layers of the OSI model
72
Headers and Trailers
73
Interaction between layers
75
1. Physical Layer
❑ It is responsible for movements of
individual bits from one hop (node) to
the next.
76
• Physical characteristics of interfaces and medium: type of
transmission medium
• Representation of bits: Define type of encoding or data
formats ( digital data into digital signal conversion).
• Date (or Transmission) rates: Number of bits sent per second
(Nb) and Tb (bit duration). Tb = 1/Nb
• Synchronization of bits: To sync sender and receiver clock.
• Line configuration: Point-to-Point OR Point-to-multipoint.
• Physical topology: Mesh, Star, Ring, Bus, or Hybrid.
• Transmission mode: Simplex, Half-duplex, or Full-duplex.
77
2. Data Link Layer
83
Source-to-destination delivery 84
4. Transport Layer
89
6. Presentation Layer
93
Reliable process-to-process delivery of a message
94
• Which one of the following is not a
client server application?
(A) Internet chat
(B) Web browsing
(C) E-mail
(D) ping
• ping
95
• In the following pairs of OSI protocol layer/sub-
layer and its functionality, the INCORRECT pair is
A. Network layer and Routing
B. Data Link Layer and Bit synchronization
C. Transport layer and End-to-end process
communication
D. Medium Access Control sub-layer and Channel
sharing
Data Link Layer and Bit synchronization
http://bitly.ws/Saiu
96
TCP/IP Protocol Suite
❑ The layers in the TCP/IP protocol suite do not exactly match those in the
OSI model.
• It is a protocol suite (a set of protocols organized in different layers) used in
the Internet today.
• Upper level protocol is supported by the 1 or 2 lower level protocols.
• Original TCP/IP: 4 layers
• Updated TCP/IP: 5 layers
https://rb.gy/uhznm
https://rb.gy/irb03
97
Layered Architecture
98
Communication through an internet
99
Logical connections between layers of the TCP/IP
protocol suite
101
TCP/IP and OSI model
102
❑ Physical and Data Link Layers:
✓ TCP/IP does not define any specific protocol but it supports all the
standard and proprietary protocols.
✓ A network in a TCT/IP internetwork can be a LAN or a WAN.
❑ Network Layer (or internetwork layer):
• TCP/IP supports the Internetworking Protocol (IP). In turn, uses 4
supporting protocols: ARP, RARP, ICMP, and IGMP
• IP: It is an unreliable and connectionless protocol – best effort delivery
service. IP transports data in packets called datagrams.
1. Address Resolution Protocol (ARP): It obtains the physical address
from the logical address.
2. Reverse ARP: It obtains the logical address from the physical address.
3. Internet Control Message Protocol (ICMP): It gives notification of
datagram problems back to the sender. It also sends query and error
reporting messages.
4. Internet Group Message Protocol (IGMP): It is used to facilitate
the simultaneous transmission of a message to a group of recipients.
❑ Transport Layer:
• Two main protocols - TCP and UDP
• IP :- Host – to – host protocol (delivery of a packet from one physical
device to another).
• UDP and TCP:- Delivery of a message from one process (running
program) to another process.
1. User Datagram Protocol (UDP):
✓ It is the simpler of the two standard TCP/IP transport protocols.
✓ It is a process – to – process to protocols that adds only port address,
checksum error control, and length information to the data.
2. Transmission Control Protocol (TCP):
✓ It provides full transport – layer services to applications.
✓ It is a reliable stream (or connection – oriented) transport protocol.
3. Stream Control Transmission Protocol (SCTP):
✓ It provides support for voice over the Internet.
✓ It combines the best features of UDP and TCP.
104
❑ Application Layer:
✓ SMTP : Simple Mail Transfer Protocol
✓ FTP : File Transfer Protocol
✓ HTTP : Hyper Text Transfer Protocol
✓ DNS : Domain Name System
✓ SNMP : Simple Network Management Protocol.
✓ TELNET : Terminal Network.
105
Encapsulation/Decapsulation
https://rb.gy/us3wv
106
Addressing
❑ Four levels of addresses are used in an internet employing the
TCP/IP protocols.
107
1. Physical addresses
❑ Also known as Link address
❑ It is the address of a node as defined by its LAN and WAN
❑ It is included in the frame used by the data link layer
❑ It is lowest-level address.
❑ Size and Format vary depending on the network.
❑ Example: Ethernet uses a 6-byte (or 48-bit or 12 hexadecimal
digits) physical address (imprinted on the NIC)
07:01:02:01:2C:4B
108
❑ IMSI = MAC (NIC)
❑ Mobile Number = IP address
109
2. Logical Addresses
110
Logical Addresses
rb.gy/la5k2
The physical addresses will change from hop to hop, but the logical addresses111
3.Port Addresses
The physical addresses change from hop to hop, but the logical
and port addresses usually remain the same. 112
4.Specific Addresses
113
Chapter 7: Transmission Media
114
Classes of transmission media
115
Twisted-Pair Cable
118
UTP connector
❑RJ 45 (Ethernet 802.3)
119
▪ 1000Base T: (Gigabit Ethernet)
✓ It need all 8 pins.
✓ It use 4 pairs (each transmits
250Mbps duplex) of wires.
✓ Parallel transmissions. 120
UTP performance
121
Applications
❑ Telephone lines to provide voice and data channels.
❑ The local loop line: Subscribers to the central
telephone office.
❑ The DSL lines: Used by telephone companies to
provide high-data-rate (or high-bandwidth)
connections.
❑ LANs : 10Base-T and 100Base-T.
122
Coaxial cable
❑ It carries HF signals than UTP cables.
❑ Larger BW is available.
123
Categories of coaxial cables
125
BNC connectors
(Bayonet Neill–Concelman)
126
Coaxial cable performance
129
Principle of light ray
131
Operating principle
132
Types
133
134
❑ Multimode: Support multiple beams
✓ Step-index : Density of the core remains constant from the center to the
edges.
✓ Graded-index: Varying densities (Density is highest at the center of the core
and decreases gradually to its lowest at the edge).
❑ Single-mode: It uses step-index fiber and carries a highly focused source
of light.
135
Fiber types
136
FOC connectors
139
Advantages
❑ Higher BW ( or higher data rates) than UTP and coaxial cable.
✓ BW utilization are limited by the signal generation and
reception technology available.
❑ Less signal attenuation:
✓ FOC: 50 km without repeater.
✓ UTP or coaxial cable: need repeaters every 5 km.
❑ Immunity to EM interference: EM noise cannot affect FOC.
❑ Resistance to corrosive materials. Glass is more resistant to
corrosive materials than copper.
❑ Light weight:
❑ Greater immunity to tapping:
✓ Signal tapping is difficult in FOC than copper cables.
✓ Copper cables create antenna effects that can easily be tapped.140
Disadvantages
❑ Installation and maintenance:
✓ FOC is a relatively new technology.
✓ Installation and maintenance require expertise that is not yet
available everywhere.
❑ Unidirectional light propagation: Two fibers are needed for
bidirectional communication.
❑ Cost: The cable and the interfaces are more expensive.
141
Unguided media: Wireless
❑ Transmission of EM waves without using a physical
conductor.
❑ Signals are normally broadcast through free space and thus are
available to anyone who has a device capable of receiving
them.
142
RF wave propagation
143
Propagation methods
144
Frequency Bands
7.145
Wireless transmission waves
7.146
RF waves: Omnidirectional antenna
(360˚ coverage)
❑ Applications:
Multicasting:
✓ AM and FM radio
✓ TV
✓ Cordless phones.
7.147
Radio Waves
■ Waves ranging in frequencies between 3KHz to 1GHz
are normally called Radio waves.
4.151
Microwaves: Unidirectional antennas
❑ Applications
✓ Point-to-point link or
Microwave link (LoS)
✓ Cellular phones
✓ Satellite networks
✓ Wireless LANs
7.152
Microwaves
■ Frequencies between 1GHz to 300 GHz
■ Applications:
1. cellular phones
2. Wireless LANs
3. Satellite networks
Note
156
Infrared
■ Infrared waves with frequencies from 300 GHz to 400
THz (1mm to 770nm wavelength)
4.159
160
161
162
Switching
❑ A network is a set of connected devices.
❑ How to connect multiple devices?
❑ Solution 1: Point-to-Point connection
between each pair of devices (a Mesh
topology) or between a central device and
every other device(a Star topology).
❑ Drawbacks:
✓ Impractical and wasteful when applied to
very large networks.
✓ The number and length of links require too
much infrastructure to be cost-efficient.
✓ The majority of those links would be idle
most of the time.
163
❑ Solution 2: Multiconnections (a Bus topology)
❑ Drawback:
✓ Distance between devices and the total number of devices
increase beyond the capacity of the media and equipment.
164
❑ Better solution: Switching
165
• Assume that source S and destination D are connected
through two intermediate routers labeled R. Determine how
many times each packet has to visit the network layer and the
data link layer during a transmission from S to D.
166
Taxonomy of switched networks
4.167
■ Networks are used to interconnect many devices.
4.169
Circuit Switching
■ Circuit switching in a network operates almost the same way as
the telephone system works.
■ A complete end-to-end path must exist before communication can
take place.
■ The computer initiating the data transfer must ask for a connection
to the destination.
■ Once the connection has been initiated and completed to the
destination device, the destination device must acknowledge that it
is ready and willing to carry on a transfer.
■ https://rb.gy/hmx74
A trivial circuit-switched network
4.171
■ There is a dedicated communication path between
two stations (end-to-end)
172
■ Communication via circuit switching has three phases:
■ Circuit establishment called Setup Phase
■ Routing & resource allocation (FDM or TDM)
4.174
Efficiency
4.176
Note
4.177
Advantages:
• The communication channel (once established) is dedicated.
• No overheads once connection establishes
Disadvantages:
• Possible long wait to establish a connection, (10 seconds, more
on long- distance or international calls.) during which no data can
be transmitted.
• More expensive than any other switching techniques, because a
dedicated path is required for each connection.
• Inefficient use of the communication channel, because the
channel is not used when the connected systems are not using it.
4.178
Message Switching
■ Message switching is a connectionless network
switching technique where the entire message is
routed from the source node to the destination node,
one hop at a time.
■ Message switching was a technique developed as an
alternate to circuit switching, before packet switching
was introduced.
■ In message switching, end users communicate by
sending and receiving messages that included the
entire data to be shared. Messages are the smallest
individual unit.
■ With message switching there is no need to establish
a dedicated path between two stations.
■ When a station sends a message, the
destination address is appended to the
message.
■ The message is then transmitted through the
network, in its entirety, from node to node.
■ Each node receives the entire message, stores
it in its entirety on disk, and then transmits
the message to the next node.
■ This type of network is called a store-and-
forward network.
■ Store and forward –
The intermediate nodes have the responsibility
of transferring the entire message to the next
node. Hence, each node must have storage
capacity. A message will only be delivered if
the next hop and the link connecting it are
both available, otherwise it’ll be stored
indefinitely. A store-and-forward switch
forwards a message only if sufficient resources
are available and the next hop is accepting
data. This is called the store-and-forward
■ Message delivery –
This implies wrapping the entire information in a
single message and transferring it from the
source to the destination node. Each message
must have a header that contains the
message routing information, including the
source and destination.
A message-switching node is typically a general-
purpose computer. The device needs sufficient
secondary-storage capacity to store the incoming
messages, which could be long. A time delay is
introduced using this type of scheme due to store-
and-forward time, plus the time required to find the
next node in the transmission path.
4.183
Delay
■ Advantages
■ Sharing of communication channels ensures better
bandwidth usage.
■ It reduces network congestion due to store and
forward method. Any switching node can store the
messages till the network is available.
■ Broadcasting messages requires much less bandwidth
than circuit switching.
■ Messages of unlimited sizes can be sent.
■ It does not have to deal with out of order packets or
lost packets as in packet switching.
■ Disadvantages
■ In order to store many messages of unlimited
sizes, each intermediate switching node
requires large storage capacity.
■ Store and forward method introduces delay at
each switching node. This renders it
unsuitable for real time applications.
Applications
The store-and-forward method was implemented
in telegraph message switching centres. Today,
although many major networks and systems are
packet-switched or circuit switched networks,
their delivery processes can be based on
message switching.
Packet Switching
4.191
Routing table in a datagram network
4.192
Note
4.193
Note
4.194
Delay in a datagram network
4.195
Note
4.196
VIRTUAL-CIRCUIT NETWORKS
4.197
Virtual Circuit
4.200
Virtual-Circuit Identifier
■ The identifier that is actually used for data transfer is
called the virtual-circuit identifier (VCI).
■ A VCI, unlike a global address, is a small number that
has only switch scope. It is used by a frame between
two switches.
■ When a frame arrives at a switch, it has a VCI; when
it leaves, it has a different VCI.
■ The following figure show how the VCI in a data
frame changes from one switch to another.
■ Note that a VCI does not need to be a large number
since each switch can use its own unique set of VCIs.
Addressing
202
Global Addressing
❑A source or a destination needs to have a global
address - an address that can be unique over world
wide.
❑ Used only to create a VCI.
203
Virtual-circuit identifier (VCI)
8.204
Three Phases
205
Setup Phase
■ In the setup phase, a switch creates an
entry for a virtual circuit.
■ For example, suppose source A needs to
create a virtual circuit to B. Two steps
are required: the setup request and
the acknowledgment.
■ Setup Request: A setup request frame
is sent from the source to the
destination. The following figure shows
the process.
■ Source A sends a setup frame to switch 1.
■ Switch 1 receives the setup request frame. It knows
that a frame going from A to B goes out through port
3. The switch, in the setup phase, acts as a packet
switch and it has a routing table which is different
from the switching table. For the moment, assume
that it knows the output port. The switch creates an
entry in its table for this virtual circuit, but it is only
able to fill three of the four columns. The switch
assigns the incoming port (1) and chooses an
available incoming VCI (14) and the outgoing port (3).
It does not yet know the outgoing VCI, which will be
found during the acknowledgment step. The switch
then forwards the frame through port 3 to switch 2.
■ Switch 2 receives the setup request frame. The same
events happen here as at switch 1 and three columns
of the table are completed: in this case, incoming port
(1), incoming VCI (66), and outgoing port (2).
■ Switch 3 receives the setup request frame. Again
three columns of table are completed: in this case
incoming port (2), incoming VCI (22), and outgoing
port (3).
■ Destination B receives the setup frame, and if it is
ready to receive frames from A, it assigns a VCI to the
incoming frames that come from A, in this case 77.
This VCI lets the destination know that the frames
come from A, and no other sources.
209
Setup request in a virtual-circuit network
4.210
Acknowledgment
■ A special frame, called the acknowledgment frame,
completes the entries in the switching tables. The
following figure shows the process.
■ The destination sends an acknowledgment to switch
3. The acknowledgment carries the global source and
destination addresses so the switch knows which
entry in the table is to be completed. The frame also
carries VCI 77, chosen by the destination as the
incoming VCI for frames from A. Switch 3 uses this
VCI to complete the outgoing VCI column for this
entry. Note that 77 is the incoming VCI for destination
B, but the outgoing VCI for switch 3.
■ Switch 3 sends an acknowledgment to switch 2 that
contains its incoming VCI in the table, chosen in the
previous step. Switch 2 uses this as the outgoing VCI
in the table.
■ Switch 2 sends an acknowledgment to switch 1 that
contains its incoming VCI in the table, chosen in the
previous step. Switch 1 uses this as the outgoing VCI
in the table.
■ Finally switch 1 sends an acknowledgment to source A
that contains its incoming VCI in the table, chosen in
the previous step.
■ The source uses this as the outgoing VCI for the data
frames to be sent to destination B.
Setup acknowledgment in a virtual-circuit network
213
Data Transfer Phase
■ To transfer a frame from a source to its destination, all
switches need to have a table entry for this virtual
circuit.
■ The table, in its simplest form, has four columns. This
means that the switch holds four pieces of information
for each virtual circuit that is already set up.
■ Each switch has a table with entries for all active
virtual circuits.
■ The following figure shows a frame arriving at port 1
with a VCI of 14. When the frame arrives, the switch
looks in its table to find port 1 and a VCI of 14. When
it is found, the switch knows to change the VCI to 22
and send out the frame from port 3.
Switch and tables in a virtual-circuit network
4.215
■ To elaborate data transfer in one
complete network, consider transfer of
packet from source to destination as
shown in next figure
Source-to-destination data transfer in a virtual-circuit network
4.217
Teardown Phase
4.219
Efficiency
220
Delay in a virtual-circuit network
4.221
Note
4.222
S(witched)VC vs. P(ermanent)VC setup
4.224
Circuit Switching and Packet
Switching
In Summary
9.230
Functionalities
231
Data signals require a higher degree of
1. Dial-up modems accuracy to ensure integrity. For
safety’s sake, therefore, the edges of
this range are not used for data
communications
232
MODEM Standards (ITU-T)
233
❑V.34bis:
✓ 28.8 kbps with 960 - point constellation.
✓ 33.6 kbps with 1664 - point constellation.
❑V.90 : 56 k modems: (world-wide telephone
companies)
✓ fs = 8000 sps
✓ n = 8 bits per sample.
✓ 7 bits for data and 1 bit for control purpose.
✓ Total bit rate: 8000 x 7 = 56 kbps.
234
Uploading and downloading in 56K modems
9.235
2.Digital Subscriber Line (DSL)
❑It provides higher-speed than exiting local lines
(Modems) to access the Internet.
❑ DSL technologies: SDSL, ADSL, HDSL, and VDSL.
✓ called: xDSL (where x can be replaced by A, V, H, or
S)
▪ ADSL: Asymmetric DSL
▪ HDL: High-bit-rate DSL
▪ VDSL: Very high-bit-rate DSL
▪ SDSL: Symmetric DSL
236
ADSL
❑Asymmetric DSL.
❑Different uploading and downloading speed.
❑Designed for residential users and not for businesses.
238
Discrete Multitone Technique (DMT)
(QAM and FDM)
9.239
❑ Channel 0: Voice channel
❑ Idle channels: 1 to 5 are not used and provide a gap between voice and
data communication.
❑ Upstream data and control:
✓ Channels: 6 to 30 (25 channels)
✓ 24 for data + 1 for control
✓ Total bit rate: 24 x 4 KHz x 15 = 1.44 Mbps
✓ Actual: below 500 kbps
❑ Downstream data and control:
✓ Channels: 31 to 255 (225 channels)
✓ 224 for data + 1 for control
✓ Total bit rate: 224 x 4 KHz x 15= 13.4 Mbps.
✓ Actual : below 8 Mbps
240
Customer site: ADSL modem
9.242
3. Cable TV network
243
Hybrid fiber-coaxial (HFC) network
245
Bandwidth
❑ Video band:
✓ RF band: 54 to 550 MHz.
✓ Each TV signal has BW of 6 MHz.
✓ RF BW = (550 - 54) MHz= 490 MHz.
✓ Number of TV channels = 490 MHz/6 MHz = 80.
9.246
Bandwidth
9.247
❑ Upstream Data Band
❑ 5 to 42 MHz. This band is also divided into 6-MHz channels.
❑ Modulation:
✓ LF are more susceptible to noise and interference. For this reason, the
QAM technique is not suitable for this band.
✓ A better solution is QPSK.
❑ Data Rate:
✓ 2 bits/symbol in QPSK.
✓ 12 Mbps (2 bits/Hz × 6 MHz)
✓ However, actual data rate is less than 12 Mbps.
248
Sharing
❑ Upstream:
✓ RF BW = (42 – 5) MHz = 37 MHz
✓ Channels = 37 MHz/6MHz = 6.
✓ How 1000, 2000, or even 100,000 subscribers can be served with 6
channels.
✓ Solution: FDM/TDM sharing.
❑ Downstream:
✓ RF BW = (750 – 550) MHz = 200 MHz
✓ Channels = 200 MHz/6 MHz = 33 channels
✓ Solution: FDM/TDM sharing.
249
CM and CMTS
CM : Cable Modem
250
Data Transmission Schemes: DOCSIS
251