Comp.anspdf (1)
Comp.anspdf (1)
Data communication: The term data communication can be defined as “the process of
using computing and
communication technologies to transfer data from one place to another, and vice
versa”.
● What is routing?
routing is the process of selecting the best path for data to travel from the source to
the destination across a network.
● What is internetworking?
internetworking is the process of connecting two or more different networks to
function as a single, larger network.
Advantages of WAN:
1. WAN covers a large geographical area.
2. WAN shares software and resources with connecting workstations.
3. Using WAN messages can be sent very quickly to anyone else on the network.
4. Expensive things (like printers or phone lines to the internet etc.) can be shared by
all the computers on the network.
5. WAN adds fluidity to user’s information communication.
Disadvantages of WAN:
1. WANs are expensive.
2. WANs need a good firewall to restrict outsiders from entering and disrupting the
network.
3. Setting up a network can be an expensive and complicated experience. The bigger
the network the more expensive it is.
4. Security is a real issue when many different people have the ability to use
information from other computers. Protection against hackers and viruses adds
more complexity and expense.
5. Slower than LAN and MAN.
Advantages of MAN:
1. MAN spans a large geographical area (5 to 50 km) than LAN.
2. MAN falls in between the LAN and WAN therefore, increases the efficiency of
handling data.
3. MAN saves the cost and time attached to establish a wide area network.
4. MAN offers centralized management of data.
5. MAN enables us to connect many fast LANs together.
Disadvantages of MAN:
1. Implementation cost is high.
2. Speed is slow.
3. In MAN there are high chances of attacking hackers on the network compared to
LAN. So data may be leaked.
4. To set up MAN it requires technical people that can correctly set up MAN.
Similarities between OSI and TCP/IP Models
2. Standard-Based Models:
Both models are based on standard protocols and are designed to allow
interoperability between different hardware and software vendors.
3. Transmission of Data:
Both models facilitate data transmission over networks, from the source to the
destination, using a step-by-step process involving multiple layers.
4. Encapsulation:
In both models, data is encapsulated with headers (and sometimes trailers) as it
moves down the layers, and decapsulated as it moves up the layers at the receiving
end.
5. Similar Layer Functions:
-The Application, Presentation, and Session layers in OSI map to the Application layer
in TCP/IP.
-The Transport layer is present in both models and is responsible for end-to-end
communication.
-The Network layer (OSI) corresponds to the Internet layer (TCP/IP).
-The Data Link and Physical layers in OSI are combined into the Network Access layer
in TCP/IP.
---
Calculation:
Maximum Bit Rate= 2×4000 ×logbase2(2) = 2 ×4000×1 = 8000bps
The maximum bit rate is 8000 bits per second (bps)
2.OSI model had Seven (7) layers. TCP/IP model has five (5) layers.
9. In the OSI model, model was In the TCP/IP model, protocol were
developed before the development developed first and then the model was
of protocols. developed
1.stand for Local area network Wide area network Metropolitan area
network
WAN:WAN (Wide Area Network) is a type of network that covers a very large geographical
area, such as a country, continent, or even the whole world.
Protocol: protocols are a set of rules and standards that define how data is transmitted and
received over a network.
Methods of Channelization:
1. FDMA (Frequency Division Multiple Access)
2. TDMA (Time Division Multiple Access)
3. CDMA (Code Division Multiple Access)
---
FDMA (Frequency Division Multiple Access):
1.In FDMA, the total bandwidth is divided into multiple frequency bands.
2.Each user is assigned a unique frequency band for the entire communication
session.
3.These frequency bands are separated by guard bands to avoid interference.
Example: Traditional radio broadcasting, where different stations operate on different
frequencies.
Advantages of FDMA:
1.Simple and easy to implement.
2.Less delay since channels are always available.
Disadvantages:
1.Inefficient use of bandwidth if some users are inactive.
2.Limited number of users due to fixed frequency allocation.
1. Resource Sharing – Allows users to share files, applications, and hardware like
printers.
2. Reliability – Offers backup paths and systems for continuous communication.
3. Scalability – Can grow by adding more devices without affecting performance.
4. Security – Protects data and resources through authentication and encryption.
2. Bandwidth in bits per second (bps): Bandwidth in bits per second refers to the
speed of bit transmission in a channel or link. For example, the bandwidth of a
Fast Ethernet network or the links is a maximum of 100 Mbps means this network
can send 100 Mbps
Throughput: •
The throughput is a measure of how fast we can actually send data through a
network.
Throughput is the rate of successful message delivery over a communication
channel/medium.
Latency:•
Latency is the time it takes for a packet to get across the network, from source to
destination.
Latency = Propagation time + Transmission time + Queuing time + Processing delay
jitter:jitter is a “packet delay variance”. The jitter is considered as a
problem when different packets of data face different delays in a network and the
data at the receiver application is time-sensitive, i.e. audio or video data.
1. ALOHA:
•ALOHA is a system for coordinating and arbitrating access to a shared
communication
Networks channel.
•ALOHA was developed in the 1970s by Norman Abramson and his colleagues at the
University of Hawaii to solve the problem of channel allocation.
•ALOHA was designed for a wireless LAN, but it can be used on any shared medium.
1. Pure ALOHA:
1.Concept: Any device can transmit data at any time without checking if the channel
is free.
2.If two devices send data at the same time, a collision occurs, and the data is lost.
3.Devices wait a random time and retransmit.
Example: Two computers on a shared network send packets at the same time →
collision → both wait randomly → retry sending.
Efficiency: About 18.4% (only this much of the time the network is used effectively).
---
2. Slotted ALOHA:
1.Improved version of Pure ALOHA.
2.Time is divided into equal time slots.
3.Devices can only transmit at the beginning of a slot.
4.Reduces the chance of collision.
Example: Devices wait for the next time slot before sending → fewer collisions.
2. Error Control
-The Data Link Layer ensures that frames are delivered without errors.
-It uses error detection techniques (like CRC) and error correction methods (like
ARQ).
3. Flow Control
-Flow control manages the rate of data transmission between sender and receiver to
prevent buffer overflow at the receiver.
-Techniques like Stop-and-Wait and Sliding Window Protocol are used.
5. Physical Addressing
The Data Link Layer adds the physical (MAC) address of the sender and receiver to
the frame to ensure proper delivery over the local network.
6. Frame Synchronization
Ensures the receiver can identify the start and end of each frame, usually by using
special bit patterns or flags.
3. Internetworking
-Enables communication between heterogeneous networks, connecting LANs, WANs,
etc., using routers.
-Provides a unified addressing and routing system.
Media Access Control (MAC) protocols are responsible for regulating access to a
shared communication channel in a network. The taxonomy (classification) of MAC
protocols can be divided into the following main categories:
Examples:
1.ALOHA (Pure ALOHA, Slotted ALOHA)
2.CSMA (Carrier Sense Multiple Access)
-CSMA/CD (with Collision Detection) – used in Ethernet
-CSMA/CA (with Collision Avoidance) – used in Wi-Fi
Examples:
-Polling – A master device polls the others for permission to transmit.
-Token Passing – A token is passed around the network; only the device with the
token can transmit.
-Reservation – Devices reserve time slots before transmission.
3. Channelization Protocols
These protocols divide the available bandwidth into separate channels and assign
them to different users.
Examples:
FDMA (Frequency Division Multiple Access)
TDMA (Time Division Multiple Access)
CDMA (Code Division Multiple Access)