Sie sind auf Seite 1von 66

8/13/2012

VOICE AND DATA COMMUNICATION

Er. Nilesh Dubey

Sr. Lecturer, Department of Electronics and Communication

Sanghvi Institute of Management and Science, Indore

INTRODUCTION

Data Communication is the exchange


of data between two devices via some
form of transmission medium(wired,
wireless, optical etc.).

1
8/13/2012

HOST COMPUTER

In a computer network, a computer


that provides end users with services
such as computation and database,
access and that usually performs
network control functions.

DATA COMMUNICATION SYSTEM


COMPONENTS

2
8/13/2012

LINE CONFIGURATION

Line configuration refers to the way two


or more communication devices attached
to a link.

A LINK is a physical pathway that


transfers data from one device to another.

3
8/13/2012

Point--to
Point to--Point Line Configuration

Point--to
Point to--Point Line Configuration

4
8/13/2012

Point--to
Point to--Point Line Configuration

Multipoint Line Configuration

5
8/13/2012

TOPOLOGY

TOPOLOGY is refers to the way a


network is laid out. The Topology of a
network is the geometrical
representation of the relationship of all
the links and linking devices(nodes).

6
8/13/2012

Mesh Topology

MESH TOPOLOGY

It has point-to-point link for each device.


For N no. of nodes no. of links = N(N-1)/2.
Number of ports per device = N-1
It is better in terms of Security and Privacy.
No traffic problem.
Fault identification is easy.
Fault in a Link does not affect whole system.
Not efficient for large number of nodes.

7
8/13/2012

Star Topology

STAR TOPOLOGY

It has point-to-point link via HUB.

Only one port and one link needed for each


node to connect any no. of other nodes.

Failure of one link does not affect the whole


network.

8
8/13/2012

Tree Topology

TREE TOPOLOGY

It is a variation of STAR TOPOLOGY.

Every device is not directly connected to central


hub.

The central HUB is a Active hub & secondary hubs


may be active or passive hub.

Active hub increases the distance that a signal can


travel.

9
8/13/2012

Bus Topology

BUS TOPOLOGY

Nodes are connected to the bus cable(backbone)


by drop lines and taps.
There is limitation of number of nodes and the
distance between the nodes.*
It is easy to install.
It uses less cabling than mesh, star or tree.
It is difficult to reconfigure.

10
8/13/2012

Ring Topology

RING TOPOLOGY

Signal pass in ring in one direction from device


to device.

Each device act as a repeater.

It is easy to install and reconfigure.

Fault isolation is easy.

11
8/13/2012

Hybrid Topology

12
8/13/2012

Simplex

Half--Duplex
Half

13
8/13/2012

Full--Duplex
Full

Transmission of Digital Data

14
8/13/2012

Parallel Transmission

Serial Transmission

15
8/13/2012

Asynchronous Transmission

Synchronous Transmission

16
8/13/2012

THE OSI MODEL

33

THE MODEL

The OSI(Open System Interconnection) model is a


layered framework for the design of network
systems that allows for communication across all
types of computer systems. Which covers all
aspects of network communication of
ISO(International Standards Organization).

34

17
8/13/2012

OSI Model Layers

35

The group of seven layers can be break in


three subgroups :
1. Layers 1,2,3 (Physical, Data link,
Network)

2. Layers 5,6,7 (session, presentation,


application)

3. Layer 4 (Transport)

36

18
8/13/2012

OSI Layers

37

An Exchange Using the OSI Model

38

19
8/13/2012

FUNCTIONS OF THE LAYERS

39

PHYSICAL LAYER

40

20
8/13/2012

FUNCTIONS OF THE PHYSICAL LAYER:


Physical characteristics of interface and transmission
medium.

Representation of bits.

Data rate control.

Synchronization of bits.

Line configuration.

Physical topology.

Transmission mode.

41

DATA LINK LAYER

Responsible for node-to-node delivery

42

21
8/13/2012

FUNCTIONS OF DATALINK LAYER:

Framing.

Physical Addressing.

Flow Control.

Error Control.

Access Control.

43

Data Link Layer Example

44

22
8/13/2012

Network Layer
It is responsible for source-to-destination delivery of
packet across multiple network

45

FUNCTIONS OF NETWORK LAYER:

Logical Addressing

Routing

46

23
8/13/2012

Network Layer Example

99 66

Continue
47

Network Layer Example

48

24
8/13/2012

Transport Layer
It is responsible for source-to-destination delivery of entire
massage.

49

FUNCTIONS OF TRANSPORT LAYER:

Service point addressing.

Segmentation and reassembling.

Connection Control.

Error control.

50

25
8/13/2012

Transport Layer Example

51

Session Layer
This layer is network dialog controller. It establishes,
maintains, and synchronizes interaction between
communicating systems.

52

26
8/13/2012

FUNCTIONS OF SESSION LAYER:

Dialog control.
Token management.

Synchronization (Check point).

53

Presentation Layer
It deals with the syntax and semantics of the information.

54

27
8/13/2012

FUNCTIONS OF PRESENTATION LAYER:

Translation.

Encryption.

Compression.

55

Application Layer
It provides user interfaces and support for the services.

56

28
8/13/2012

FUNCTIONS OF APPLICATION LAYER:

Network virtual terminal.

FTAM (File transfer, access, and


management).

Mail services.

Directory services.

57

Summary of Layer Functions

58

29
8/13/2012

Er. Nilesh Dubey 8/13/2012

WHAT IS RS-232?

RS-232 is a standard by which two serial


devices communicate:
The connection must be no longer than 50 feet.
Transmission voltages are 15V and +15V.

It is designed around transmission of characters


(of 7 bits of length).

30
8/13/2012

RS-232 (CONT.)

One important aspect of RS-232 is that it is


an asynchronous form of communication.
Asynchronous communication is important
because it is efficient; if no data needs to be
sent, the connection is idle. No additional
CPU overhead is required for an idle serial
line.

LOGICAL VOLTAGES

Logical 1 is 15VDC.
Logical 0 is +15VDC.

When the connection is idle, the hardware


ties the connection to logical 1.

31
8/13/2012

HOW CAN YOU TRANSMIT DATA?

RS-232 communication is dependent on a


set timing speed at which both pieces of
hardware communicate. In other words, the
hardware knows how long a bit should be
high or low.
RS-232 also specifies the use of start and
stop bits.

Er. Nilesh Dubey 8/13/2012

DB25 AND DB9


A D-sub contains two or more parallel rows
of pins or sockets usually surrounded by a D-
shaped metal shield that provides
mechanical support, ensures correct
orientation, and may screen against
electromagnetic interference.
The part containing pin contacts is called the
male connector or plug,
while that containing socket contacts is
called the female connector or socket.

32
8/13/2012

Er. Nilesh Dubey 8/13/2012

CONT.

RS-232 devices originally used the DB25,


but for many applications the less common
signals were omitted, allowing a DE9 to be
used.

RS-232 DB9 PIN OUT

33
8/13/2012

RS-232 DB25 PIN OUT

DTE-DCE INTERFACE

There are two terms important to computer


networking:
Date Terminal Equipment (DTE)
Data Circuit-terminating Equipment (DCE)

34
8/13/2012

Transmission Media

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 7.69

Figure 7.1 Transmission medium and physical layer

7.70

35
8/13/2012

Figure 7.2 Classes of transmission media

7.71

7-1 GUIDED MEDIA

Guided media, which are those that provide a conduit


from one device to another, include twisted
twisted--pair cable,
coaxial cable, and fiber
fiber--optic cable
cable..

Topics discussed in this section:


Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable

7.72

36
8/13/2012

Figure 7.3 Twisted-pair cable

7.73

Figure 7.4 UTP and STP cables

7.74

37
8/13/2012

Table 7.1 Categories of unshielded twisted-pair cables

7.75

Figure 7.5 UTP connector

7.76

38
8/13/2012

Figure 7.6 UTP performance

7.77

Figure 7.7 Coaxial cable

7.78

39
8/13/2012

Table 7.2 Categories of coaxial cables

7.79

Figure 7.8 BNC connectors

7.80

40
8/13/2012

Fiber optics: Bending of light ray

7.81

Figure 7.11 Optical fiber

7.82

41
8/13/2012

Figure 7.12 Propagation modes

7.83

Figure 7.13 Modes

7.84

42
8/13/2012

Unguided Media Wireless transmission waves

7.85

Note

Radio waves are used for multicast


communications, such as radio and
television, and paging systems.
They can penetrate through walls.
Highly regulated.
Use omni directional antennas

7.86

43
8/13/2012

Figure 7.20 Omnidirectional antenna

7.87

Note

Microwaves are used for unicast communication


such as cellular telephones, satellite networks,
and wireless LANs.
Higher frequency ranges
Cannot penetrate walls.
Uses directional antennas - point to point line of
sight communications.

7.88

44
8/13/2012

Figure 7.21 Unidirectional antennas

7.89

Note

Infrared signals can be used for short-range


communication in a closed area using line-
of-sight propagation.

7.90

45
8/13/2012

UNIT - 5

ERROR DETECTION & CORRECTION

46
8/13/2012

Single--bit error
Single

Multiple--bit error
Multiple

47
8/13/2012

Burst error

Redundancy

48
8/13/2012

VRC

49
8/13/2012

LRC

VRC and LRC

50
8/13/2012

CRC

Binary Division

51
8/13/2012

Checksum

Data Unit and Checksum

52
8/13/2012

Hamming Code

Hamming Code

53
8/13/2012

Hamming Code

Example of Hamming Code

54
8/13/2012

Single--bit error
Single

Error
Detection

55
8/13/2012

ECHO CHECKING

Data flow

Echo Data
flow
B

SWITCHING TECHNIQUES
In large networks there might be multiple paths
linking sender and receiver.
Information may be switched as it travels through
various communication channels.

There are three typical switching techniques


available for digital traffic.

Circuit Switching
Message Switching
Packet Switching

56
8/13/2012

CIRCUIT SWITCHING
Circuit switching is a technique that
directly connects the sender and the
receiver in an unbroken path.

Telephone switching equipment, for


example, establishes a path that
connects the caller's telephone to the
receiver's telephone by making a
physical connection.

Er. Nilesh Dubey 8/13/2012

CONT..

With this type of switching technique, once a


connection is established, a dedicated path
exists between both ends until the
connection is terminated.

Routing decisions must be made when the


circuit is first established, but there are no
decisions made after that time.

57
8/13/2012

CIRCUIT SWITCHING

A complete end-to-end path must exist before


communication can take place.

The computer initiating the data transfer must


ask for a connection to the destination.

Once the connection has been initiated and


completed to the destination device, the
destination device must acknowledge that it is
ready and willing to carry on a transfer.

CIRCUIT SWITCHING

Advantages:
The communication channel (once
established) is dedicated.

Desired speed can be achieved.

Low error rate.

58
8/13/2012

Er. Nilesh Dubey 8/13/2012

Disadvantages:
Possible long wait to establish a connection, (10
seconds, more on long- distance or international calls.)
during which no data can be transmitted.

More expensive than any other switching techniques,


because a dedicated path is required for each
connection.

Inefficient use of the communication channel, because


the channel is not used when the connected systems are
not using it.

MESSAGE SWITCHING

With message switching there is no need to establish a


dedicated path between two stations.
When a station sends a message, the destination
address is appended to the message.
The message is then transmitted through the network,
in its entirety, from node to node.
Each node receives the entire message, stores it in its
entirety on disk, and then transmits the message to the
next node.
This type of network is called a store-and-forward
network.

59
8/13/2012

MESSAGE SWITCHING

MESSAGE SWITCHING
Advantages:
Channel efficiency can be greater compared to circuit-
switched systems, because more devices are sharing
the channel.

Traffic congestion can be reduced, because messages


may be temporarily stored in route.

Message priorities can be established due to store-and-


forward technique.

60
8/13/2012

MESSAGE SWITCHING
Disadvantages
Message switching is not compatible with
interactive applications.

Store-and-forward devices are expensive,


because they must have large disks to hold
potentially long messages.

PACKET SWITCHING

Packet switching can be seen as a solution that


tries to combine the advantages of message and
circuit switching and to minimize the disadvantages of
both.

There are two methods of packet switching:


Datagram and virtual circuit.

61
8/13/2012

Er. Nilesh Dubey 8/13/2012

PACKET SWITCHING
In both packet switching methods, a message is broken
into small parts, called packets.
Each packet is tagged with appropriate source and
destination addresses.
Since packets have a strictly defined maximum length,
they can be stored in main memory instead of disk, therefore
access delay and cost are minimized.
Also the transmission speeds, between nodes, are
optimized.
With current technology, packets are generally accepted
onto the network on a first-come, first-served basis. If the
network becomes overloaded, packets are delayed or
discarded (``dropped'').

62
8/13/2012

DATAGRAM PACKET SWITCHING:


Datagram packet switching is similar to message
switching in that each packet is a self-contained unit with
complete addressing information attached.

This fact allows packets to take a variety of possible paths


through the network.

So the packets, each with the same destination address,


do not follow the same route, and they may arrive out of
sequence at the exit point node (or the destination).

Er. Nilesh Dubey 8/13/2012

Reordering is done at the destination based on the


sequence number of the packets.

It is possible for a packet to be destroyed if one of the nodes


on its way is crashed momentarily. Thus all its queued
packets may be lost.

63
8/13/2012

PACKET SWITCHING:VIRTUAL CIRCUIT

In the virtual circuit approach, a preplanned route is


established before any data packets are sent.

A logical connection is established when

a sender send a "call request packet" to the receiver


the receiver send back an acknowledge packet "call
accepted packet" to the sender if the receiver agrees on
conversational parameters.

Er. Nilesh Dubey 8/13/2012

The conversational parameters can be maximum packet


sizes, path to be taken, and other variables necessary to
establish and maintain the conversation.

Virtual circuits imply acknowledgements, flow control, and


error control, so virtual circuits are reliable.

That is, they have the capability to inform upper-protocol


layers if a transmission problem occurs.

64
8/13/2012

PACKET SWITCHING:VIRTUAL CIRCUIT


In virtual circuit, the route between stations does not mean
that this is a dedicated path, as in circuit switching.

A packet is still buffered at each node and queued for output


over a line.
The difference between virtual circuit and datagram
approaches:

With virtual circuit, the node does not need to make a


routing
decision for each packet.
It is made only once for all packets using that virtual circuit.

ADVANTAGES OF PACKET SWITCHING


Advantages:
Packet switching is cost effective, because switching
devices do not need massive amount of secondary
storage.
Packet switching offers improved delay characteristics,
because there are no long messages in the queue
(maximum packet size is fixed).
Packet can be rerouted if there is any problem, such as,
busy or disabled links.
Many network users can share the same channel at the
same time. Packet switching can maximize link efficiency
by making optimal use of link bandwidth.

65
8/13/2012

DISADVANTAGES OF PACKET SWITCHING


Disadvantages:
Protocols for packet switching are typically more
complex.

If packet is lost, sender needs to retransmit the data.

Another disadvantage is that packet-switched systems


still cant deliver the same quality as dedicated circuits
in applications requiring very little delay - like voice
conversations or moving images.

66

Das könnte Ihnen auch gefallen