Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
1
8/13/2012
HOST COMPUTER
2
8/13/2012
LINE CONFIGURATION
3
8/13/2012
Point--to
Point to--Point Line Configuration
Point--to
Point to--Point Line Configuration
4
8/13/2012
Point--to
Point to--Point Line Configuration
5
8/13/2012
TOPOLOGY
6
8/13/2012
Mesh Topology
MESH TOPOLOGY
7
8/13/2012
Star Topology
STAR TOPOLOGY
8
8/13/2012
Tree Topology
TREE TOPOLOGY
9
8/13/2012
Bus Topology
BUS TOPOLOGY
10
8/13/2012
Ring Topology
RING TOPOLOGY
11
8/13/2012
Hybrid Topology
12
8/13/2012
Simplex
Half--Duplex
Half
13
8/13/2012
Full--Duplex
Full
14
8/13/2012
Parallel Transmission
Serial Transmission
15
8/13/2012
Asynchronous Transmission
Synchronous Transmission
16
8/13/2012
33
THE MODEL
34
17
8/13/2012
35
3. Layer 4 (Transport)
36
18
8/13/2012
OSI Layers
37
38
19
8/13/2012
39
PHYSICAL LAYER
40
20
8/13/2012
Representation of bits.
Synchronization of bits.
Line configuration.
Physical topology.
Transmission mode.
41
42
21
8/13/2012
Framing.
Physical Addressing.
Flow Control.
Error Control.
Access Control.
43
44
22
8/13/2012
Network Layer
It is responsible for source-to-destination delivery of
packet across multiple network
45
Logical Addressing
Routing
46
23
8/13/2012
99 66
Continue
47
48
24
8/13/2012
Transport Layer
It is responsible for source-to-destination delivery of entire
massage.
49
Connection Control.
Error control.
50
25
8/13/2012
51
Session Layer
This layer is network dialog controller. It establishes,
maintains, and synchronizes interaction between
communicating systems.
52
26
8/13/2012
Dialog control.
Token management.
53
Presentation Layer
It deals with the syntax and semantics of the information.
54
27
8/13/2012
Translation.
Encryption.
Compression.
55
Application Layer
It provides user interfaces and support for the services.
56
28
8/13/2012
Mail services.
Directory services.
57
58
29
8/13/2012
WHAT IS RS-232?
30
8/13/2012
RS-232 (CONT.)
LOGICAL VOLTAGES
Logical 1 is 15VDC.
Logical 0 is +15VDC.
31
8/13/2012
32
8/13/2012
CONT.
33
8/13/2012
DTE-DCE INTERFACE
34
8/13/2012
Transmission Media
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 7.69
7.70
35
8/13/2012
7.71
7.72
36
8/13/2012
7.73
7.74
37
8/13/2012
7.75
7.76
38
8/13/2012
7.77
7.78
39
8/13/2012
7.79
7.80
40
8/13/2012
7.81
7.82
41
8/13/2012
7.83
7.84
42
8/13/2012
7.85
Note
7.86
43
8/13/2012
7.87
Note
7.88
44
8/13/2012
7.89
Note
7.90
45
8/13/2012
UNIT - 5
46
8/13/2012
Single--bit error
Single
Multiple--bit error
Multiple
47
8/13/2012
Burst error
Redundancy
48
8/13/2012
VRC
49
8/13/2012
LRC
50
8/13/2012
CRC
Binary Division
51
8/13/2012
Checksum
52
8/13/2012
Hamming Code
Hamming Code
53
8/13/2012
Hamming Code
54
8/13/2012
Single--bit error
Single
Error
Detection
55
8/13/2012
ECHO CHECKING
Data flow
Echo Data
flow
B
SWITCHING TECHNIQUES
In large networks there might be multiple paths
linking sender and receiver.
Information may be switched as it travels through
various communication channels.
Circuit Switching
Message Switching
Packet Switching
56
8/13/2012
CIRCUIT SWITCHING
Circuit switching is a technique that
directly connects the sender and the
receiver in an unbroken path.
CONT..
57
8/13/2012
CIRCUIT SWITCHING
CIRCUIT SWITCHING
Advantages:
The communication channel (once
established) is dedicated.
58
8/13/2012
Disadvantages:
Possible long wait to establish a connection, (10
seconds, more on long- distance or international calls.)
during which no data can be transmitted.
MESSAGE SWITCHING
59
8/13/2012
MESSAGE SWITCHING
MESSAGE SWITCHING
Advantages:
Channel efficiency can be greater compared to circuit-
switched systems, because more devices are sharing
the channel.
60
8/13/2012
MESSAGE SWITCHING
Disadvantages
Message switching is not compatible with
interactive applications.
PACKET SWITCHING
61
8/13/2012
PACKET SWITCHING
In both packet switching methods, a message is broken
into small parts, called packets.
Each packet is tagged with appropriate source and
destination addresses.
Since packets have a strictly defined maximum length,
they can be stored in main memory instead of disk, therefore
access delay and cost are minimized.
Also the transmission speeds, between nodes, are
optimized.
With current technology, packets are generally accepted
onto the network on a first-come, first-served basis. If the
network becomes overloaded, packets are delayed or
discarded (``dropped'').
62
8/13/2012
63
8/13/2012
64
8/13/2012
65
8/13/2012
66