Computer Communication EC 407

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 60

COMPUTER COMMUNICATION

EC 407

1
Syllabus

2
Syllabus

3
Syllabus

4
Syllabus

5
References

6
UNIT 2

7
Transmission Medium
A transmission medium can be broadly defined as anything
that can carry information from a source to destination
A transmission medium is usually free space, metallic cable
or fiber optic cable

8
Transmission Medium

9
Guided Medium
Twisted pair cable, coaxial cable and fiber optic cable

Twisted pair and coaxial cable uses metallic conductors


that accepts and transport signals in the form of electric
current

Optical fiber accepts and transports signals in the form of


light

10
Twisted-Pair cable

11
Unshielded and Shielded Twisted-Pair
UTP and STP

12
Unshielded Twisted-Pair Categories

13
Unshielded Twisted-Pair Categories

14
UTP connectors
Most common UTP connector is RJ45
RJ stands for registered jack
RJ45 is a keyed connector, meaning connector can inserted
in only one way

15
UTP Performances

16
Applications of Twisted-Pair Cable

Used in telephone lines to provide voice and data channels

The line that connects subscribers to central telephone


office commonly consists of UTP

Some LANS are also using the TPC

17
Coaxial Cable
Consists of inner conductor (copper) and Outer conductor
(metal foil, braid or a combination of the two)

18
Coaxial Cable Standards
RG (Radio Government) number (RG ratings) denotes a
unique set of physical specification including
Wire gauge of the inner conductor
Thickness and type of inner insulator
Construction of the shield
Size and type of outer casing

19
Coaxial Cable Connectors
Most common type of connector used today is Bayone-Neil-
Concelman (BNC) connector
BNC used to connect end of the cable to a device such as
TV set
BNC T is used for branching
BNC terminator is used at the end of the cable to
prevent reflection of the signal

20
Coaxial Cable Performances

21
Coaxial Cable Applications

Used in analog telephone networks

Cable TV networks

Ethernet LANs

22
Fiber-Optic Cable

23
Fiber-Optic Cable-Propagation Modes

24
Fiber-Optic Cable-Propagation Modes

25
Fiber Types

26
Cable Composition
Outer jacket is made up of PVC or Teflon

27
Cable Connectors

28
Performance
Attenuation is flatter than co-axial and twisted-pair cables

29
Applications, Advantages and
Disadvantages
Backbone networks
Cable TV
LANs

30
Applications, Advantages and
Disadvantages

31
Unguided Transmission Media

32
Unguided Transmission Media

33
Unguided Transmission Media

34
Unguided Transmission Media

35
Data Link Control( DLC)
 In the OSI networking model, Data Link Control (DLC) is
the service provided by the data link layer.

 Network interface cards have a DLC address that identifies


each card.
 DLC identifier (DLCI) that uniquely identifies the node on
the network.

 For networks that conform to the IEEE 802 standards (e.g.,


Ethernet ), the DLC address is usually called the Media
Access Control (MAC) address.

36
Data Link Layer-Framing
Framing separates message of one
source/destination from another
source/destination by adding sender and
receiver address.
Framing can be of two types – fixed size and
variable size
In fixed size framing, there is no need of
defining the boundaries of the frame.
Size of frame itself can be used as delimiter
In Variable size framing, the end of one frame
and beginning of the next.
For this two approaches- Character oriented
approach and bit oriented approach
37
Character Oriented Protocol
Uses 8 bit characters from a coding system
such as ASCII- known as flag
Flag is added at the beginning and end of
each frame to separate form other frames

38
Character Oriented Protocol
If the data contains same characters as
that of flag, it is difficult to separate flag
from the data
There is another approach – Byte stuffing
and unstuffing
The data section is stuffed with an extra
byte called escape character (ESC), which
has a predefined pattern

39
Character Oriented Protocol

40
Bit Oriented Protocol
Most protocols uses a special bit pattern
flag 01111110 as the delimiter to define
beginning and end of the frame

41
Bit Oriented Protocol
If the flag pattern appears, bit stuffing is
needed to prevent the pattern from looking
like a flag.

42
Bit Oriented Protocol

43
Flow Control
 Necessary when data is being sent faster than it can be
processed by receiver.

 If sender sends faster than recipient processes, then


buffer overflow occurs
Flow control prevents buffer overflow

 Flow control can be of two types


1. Stop & Wait
2. Sliding window

44
1. Stop and Wait Flow Control
This flow control mechanism forces the
sender after transmitting a data frame to
stop and wait until the acknowledgement
of the data-frame sent is received.
1. Source transmits frame
2. Destination receives frame and replies with
acknowledgement (ACK)
3. Source waits for ACK before sending next frame
4. Destination can stop flow by not sending ACK
5. Works well for large frames
6. Inefficient for smaller frames
Stop and Wait Flow Control
Stop and Wait Automatic Repeat Request
Protocol(Stop-and-Wait ARQ)
It is an improved version of Stop and Wait protocol with
error control mechanism
Error correction in Stop-and-Wait ARQ is done by keeping a
copy of send frame and retransmitting of the frame when the
timer expires.
Design of Stop-and-Wait ARQ Protocol
Flow Diagram for Stop-and-Wait ARQ
Protocol
Stop and Wait Flow Control
 Generally large block of data split into small frames
Called “Fragmentation” and is used when

1. Limited buffer size at receiver


2. Errors detected sooner (when whole frame received)
3. On error, retransmission of smaller frames is needed
4. Prevents one station occupying medium for long periods

 Channel Utilization is higher when

1. The transmission time is longer than the propagation time


2. Frame length is larger than the bit length of the link
Sliding Window Flow Control
 The problem of “Stop and Wait” is not able to send multiple
packets

 Sliding Window Protocol allows multiple frames to be in


transit

 In this flow control mechanism both sender and receiver


agrees on the number of frames after which the
acknowledgement should be sent.
Sliding Window Flow Control

1. Receiver has buffer of W (called window size) frames


2. Transmitter can send up to W frames without ACK
3. Each frame is numbered
4. Sequence number bounded by size of the sequence
number field
5. ACK includes number of next frame expected
Sliding Window Flow Control (W
= 5)
Example of a Sliding Window
Protocol (W = 7)
Go-Back-N Automatic Repeat Request
1. Several frames can be send before receiving acknowledgement
2. Sender keeps a copy of these frames until ACK arrives
3. If the header of the frame allows ‘m’ bits for the sequence
number, the sequence number range from
4. If m=4, then sequence numbers are

5. Sliding window is an abstract concept that defines range of


sequence numbers that is concern of sender and receiver.
Go-Back-N ARQ
Go-Back-N ARQ
Go-Back-N ARQ
Go-Back-N ARQ

In following example, data frames are not lost, but some Ack are
lost and some are delayed. Cumulative ack solve this problem
Go-Back-N ARQ

You might also like