Free Essay

Data Communication and Networking

In: Computers and Technology

Submitted By amitravi
Words 4487
Pages 18
What is Data Communications?

The distance over which data moves within a computer may vary from a few thousandths of an inch, as is the case within a single IC chip, to as much as several feet along the backplane of the main circuit board. Over such small distances, digital data may be transmitted as direct, two-level electrical signals over simple copper conductors. Except for the fastest computers, circuit designers are not very concerned about the shape of the conductor or the analog characteristics of signal transmission.

Frequently, however, data must be sent beyond the local circuitry that constitutes a computer. In many cases, the distances involved may be enormous. Unfortunately, as the distance between the source of a message and its destination increases, accurate transmission becomes increasingly difficult. This results from the electrical distortion of signals traveling through long conductors, and from noise added to the signal as it propagates through a transmission medium. Although some precautions must be taken for data exchange within a computer, the biggest problems occur when data is transferred to devices outside the computer's circuitry. In this case, distortion and noise can become so severe that information is lost.

Data Communications concerns the transmission of digital messages to devices external to the message source. "External" devices are generally thought of as being independently powered circuitry that exists beyond the chassis of a computer or other digital message source. As a rule, the maximum permissible transmission rate of a message is directly proportional to signal power, and inversely proportional to channel noise. It is the aim of any communications system to provide the highest possible transmission rate at the lowest possible power and with the least possible noise.

Communications Channels

A communications channel is a pathway over which information can be conveyed. It may be defined by a physical wire that connects communicating devices, or by a radio, laser, or other radiated energy source that has no obvious physical presence. Information sent through a communications channel has a source from which the information originates, and a destination to which the information is delivered. Although information originates from a single source, there may be more than one destination, depending upon how many receive stations are linked to the channel and how much energy the transmitted signal possesses.

In a digital communications channel, the information is represented by individual data bits, which may be encapsulated into multibit message units. A byte, which consists of eight bits, is an example of a message unit that may be conveyed through a digital communications channel. A collection of bytes may itself be grouped into a frame or other higher-level message unit. Such multiple levels of encapsulation facilitate the handling of messages in a complex data communications network.

Any communications channel has a direction associated with it:

The message source is the transmitter, and the destination is the receiver. A channel whose direction of transmission is unchanging is referred to as a simplex channel. For example, a radio station is a simplex channel because it always transmits the signal to its listeners and never allows them to transmit back.

A half-duplex channel is a single physical channel in which the direction may be reversed. Messages may flow in two directions, but never at the same time, in a half-duplex system. In a telephone call, one party speaks while the other listens. After a pause, the other party speaks and the first party listens. Speaking simultaneously results in garbled sound that cannot be understood.

A full-duplex channel allows simultaneous message exchange in both directions. It really consists of two simplex channels, a forward channel and a reverse channel, linking the same points. The transmission rate of the reverse channel may be slower if it is used only for flow control of the forward channel.

Serial Communications
Most digital messages are vastly longer than just a few bits. Because it is neither practical nor economic to transfer all bits of a long message simultaneously, the message is broken into smaller parts and transmitted sequentially. Bit-serial transmission conveys a message one bit at a time through a channel. Each bit represents a part of the message. The individual bits are then reassembled at the destination to compose the message. In general, one channel will pass only one bit at a time. Thus, bit-serial transmission is necessary in data communications if only a single channel is available. Bit-serial transmission is normally just called serial transmission and is the chosen communications method in many computer peripherals.

Byte-serial transmission conveys eight bits at a time through eight parallel channels. Although the raw transfer rate is eight times faster than in bit-serial transmission, eight channels are needed, and the cost may be as much as eight times higher to transmit the message. When distances are short, it may nonetheless be both feasible and economic to use parallel channels in return for high data rates. The popular Centronics printer interface is a case where byte-serial transmission is used. As another example, it is common practice to use a 16-bit-wide data bus to transfer data between a microprocessor and memory chips; this provides the equivalent of 16 parallel channels. On the other hand, when communicating with a timesharing system over a modem, only a single channel is available, and bit-serial transmission is required. This figure illustrates these ideas:

The baud rate refers to the signalling rate at which data is sent through a channel and is measured in electrical transitions per second. In the EIA232 serial interface standard, one signal transition, at most, occurs per bit, and the baud rate and bit rate are identical. In this case, a rate of 9600 baud corresponds to a transfer of 9,600 data bits per second with a bit period of 104 microseconds (1/9600 sec.). If two electrical transitions were required for each bit, as is the case in non-return-to-zero coding, then at a rate of 9600 baud, only 4800 bits per second could be conveyed. The channel efficiency is the number of bits of useful information passed through the channel per second. It does not include framing, formatting, and error detecting bits that may be added to the information bits before a message is transmitted, and will always be less than one.

The data rate of a channel is often specified by its bit rate (often thought erroneously to be the same as baud rate). However, an equivalent measure channel capacity is bandwidth. In general, the maximum data rate a channel can support is directly proportional to the channel's bandwidth and inversely proportional to the channel's noise level.

A communications protocol is an agreed-upon convention that defines the order and meaning of bits in a serial transmission. It may also specify a procedure for exchanging messages. A protocol will define how many data bits compose a message unit, the framing and formatting bits, any error-detecting bits that may be added, and other information that governs control of the communications hardware. Channel efficiency is determined by the protocol design rather than by digital hardware considerations. Note that there is a tradeoff between channel efficiency and reliability - protocols that provide greater immunity to noise by adding error-detecting and -correcting codes must necessarily become less efficient.

Asynchronous vs. Synchronous Transmission

Serialized data is not generally sent at a uniform rate through a channel. Instead, there is usually a burst of regularly spaced binary data bits followed by a pause, after which the data flow resumes. Packets of binary data are sent in this manner, possibly with variable-length pauses between packets, until the message has been fully transmitted. In order for the receiving end to know the proper moment to read individual binary bits from the channel, it must know exactly when a packet begins and how much time elapses between bits. When this timing information is known, the receiver is said to be synchronized with the transmitter, and accurate data transfer becomes possible. Failure to remain synchronized throughout a transmission will cause data to be corrupted or lost.

Two basic techniques are employed to ensure correct synchronization. In synchronous systems, separate channels are used to transmit data and timing information. The timing channel transmits clock pulses to the receiver. Upon receipt of a clock pulse, the receiver reads the data channel and latches the bit value found on the channel at that moment. The data channel is not read again until the next clock pulse arrives. Because the transmitter originates both the data and the timing pulses, the receiver will read the data channel only when told to do so by the transmitter (via the clock pulse), and synchronization is guaranteed.

Techniques exist to merge the timing signal with the data so that only a single channel is required. This is especially useful when synchronous transmissions are to be sent through a modem. Two methods in which a data signal is self-timed are nonreturn-to-zero and biphase Manchester coding. These both refer to methods for encoding a data stream into an electrical waveform for transmission.

In asynchronous systems, a separate timing channel is not used. The transmitter and receiver must be preset in advance to an agreed-upon baud rate. A very accurate local oscillator within the receiver will then generate an internal clock signal that is equal to the transmitter's within a fraction of a percent. For the most common serial protocol, data is sent in small packets of 10 or 11 bits, eight of which constitute message information. When the channel is idle, the signal voltage corresponds to a continuous logic '1'. A data packet always begins with a logic '0' (the start bit) to signal the receiver that a transmission is starting. The start bit triggers an internal timer in the receiver that generates the needed clock pulses. Following the start bit, eight bits of message data are sent bit by bit at the agreed upon baud rate. The packet is concluded with a parity bit and stop bit. One complete packet is illustrated below:

The packet length is short in asynchronous systems to minimize the risk that the local oscillators in the receiver and transmitter will drift apart. When high-quality crystal oscillators are used, synchronization can be guaranteed over an 11-bit period. Every time a new packet is sent, the start bit resets the synchronization, so the pause between packets can be arbitrarily long. Note that the EIA232 standard defines electrical, timing, and mechanical characteristics of a serial interface. However, it does not include the asynchronous serial protocol shown in the previous figure, or the ASCII alphabet described next.

The ASCII Character Set

Characters sent through a serial interface generally follow the ASCII (American Standard Code for Information Interchange) character standard:

This standard relates binary codes to printable characters and control codes. Fully 25 percent of the ASCII character set represents nonprintable control codes, such as carriage return (CR) and line feed (LF). Most modern character-oriented peripheral equipment abides by the ASCII standard, and thus may be used interchangeably with different computers.

Parity and Checksums

Noise and momentary electrical disturbances may cause data to be changed as it passes through a communications channel. If the receiver fails to detect this, the received message will be incorrect, resulting in possibly serious consequences. As a first line of defense against data errors, they must be detected. If an error can be flagged, it might be possible to request that the faulty packet be resent, or to at least prevent the flawed data from being taken as correct. If sufficient redundant information is sent, one- or two-bit errors may be corrected by hardware within the receiver before the corrupted data ever reaches its destination.

A parity bit is added to a data packet for the purpose of error detection. In the even-parity convention, the value of the parity bit is chosen so that the total number of '1' digits in the combined data plus parity packet is an even number. Upon receipt of the packet, the parity needed for the data is recomputed by local hardware and compared to the parity bit received with the data. If any bit has changed state, the parity will not match, and an error will have been detected. In fact, if an odd number of bits (not just one) have been altered, the parity will not match. If an even number of bits have been reversed, the parity will match even though an error has occurred. However, a statistical analysis of data communication errors has shown that a single-bit error is much more probable than a multibit error in the presence of random noise. Thus, parity is a reliable method of error detection.

Another approach to error detection involves the computation of a checksum. In this case, the packets that constitute a message are added arithmetically. A checksum number is appended to the packet sequence so that the sum of data plus checksum is zero. When received, the packet sequence may be added, along with the checksum, by a local microprocessor. If the sum is nonzero, an error has occurred. As long as the sum is zero, it is highly unlikely (but not impossible) that any data has been corrupted during transmission.

Errors may not only be detected, but also corrected if additional code is added to a packet sequence. If the error probability is high or if it is not possible to request retransmission, this may be worth doing. However, including error-correcting code in a transmission lowers channel efficiency, and results in a noticeable drop in channel throughput.

Data Compression

If a typical message were statistically analyzed, it would be found that certain characters are used much more frequently than others. By analyzing a message before it is transmitted, short binary codes may be assigned to frequently used characters and longer codes to rarely used characters. In doing so, it is possible to reduce the total number of characters sent without altering the information in the message. Appropriate decoding at the receiver will restore the message to its original form. This procedure, known as data compression, may result in a 50 percent or greater savings in the amount of data transmitted. Even though time is necessary to analyze the message before it is transmitted, the savings may be great enough so that the total time for compression, transmission, and decompression will still be lower than it would be when sending an uncompressed message.

Some kinds of data will compress much more than others. Data that represents images, for example, will usually compress significantly, perhaps by as much as 80 percent over its original size. Data representing a computer program, on the other hand, may be reduced only by 15 or 20 percent.

A compression method called Huffman coding is frequently used in data communications, and particularly in fax transmission. Clearly, most of the image data for a typical business letter represents white paper, and only about 5 percent of the surface represents black ink. It is possible to send a single code that, for example, represents a consecutive string of 1000 white pixels rather than a separate code for each white pixel. Consequently, data compression will significantly reduce the total message length for a faxed business letter. Were the letter made up of randomly distributed black ink covering 50 percent of the white paper surface, data compression would hold no advantages.

Data Encryption

Privacy is a great concern in data communications. Faxed business letters can be intercepted at will through tapped phone lines or intercepted microwave transmissions without the knowledge of the sender or receiver. To increase the security of this and other data communications, including digitized telephone conversations, the binary codes representing data may be scrambled in such a way that unauthorized interception will produce an indecipherable sequence of characters. Authorized receive stations will be equipped with a decoder that enables the message to be restored. The process of scrambling, transmitting, and descrambling is known as encryption.

Custom integrated circuits have been designed to perform this task and are available at low cost. In some cases, they will be incorporated into the main circuitry of a data communications device and function without operator knowledge. In other cases, an external circuit is used so that the device, and its encrypting/decrypting technique, may be transported easily.

Data Storage Technology

Normally, we think of communications science as dealing with the contemporaneous exchange of information between distant parties. However, many of the same techniques employed in data communications are also applied to data storage to ensure that the retrieval of information from a storage medium is accurate. We find, for example, that similar kinds of error-correcting codes used to protect digital telephone transmissions from noise are also used to guarantee correct readback of digital data from compact audio disks, CD-ROMs, and tape backup systems.

Data Transfer in Digital Circuits

Data is typically grouped into packets that are either 8, 16, or 32 bits long, and passed between temporary holding units called registers. Data within a register is available in parallel because each bit exits the register on a separate conductor. To transfer data from one register to another, the output conductors of one register are switched onto a channel of parallel wires referred to as a bus. The input conductors of another register, which is also connected to the bus, capture the information:

Following a data transaction, the content of the source register is reproduced in the destination register. It is important to note that after any digital data transfer, the source and destination registers are equal; the source register is not erased when the data is sent.

The transmit and receive switches shown above are electronic and operate in response to commands from a central control unit. It is possible that two or more destination registers will be switched on to receive data from a single source. However, only one source may transmit data onto the bus at any time. If multiple sources were to attempt transmission simultaneously, an electrical conflict would occur when bits of opposite value are driven onto a single bus conductor. Such a condition is referred to as a bus contention. Not only will a bus contention result in the loss of information, but it also may damage the electronic circuitry. As long as all registers in a system are linked to one central control unit, bus contentions should never occur if the circuit has been designed properly. Note that the data buses within a typical microprocessor are funda-mentally half-duplex channels.

Transmission over Short Distances (< 2 feet)

When the source and destination registers are part of an integrated circuit (within a microprocessor chip, for example), they are extremely close (thousandths of an inch). Consequently, the bus signals are at very low power levels, may traverse a distance in very little time, and are not very susceptible to external noise and distortion. This is the ideal environment for digital communications. However, it is not yet possible to integrate all the necessary circuitry for a computer (i.e., CPU, memory, disk control, video and display drivers, etc.) on a single chip. When data is sent off-chip to another integrated circuit, the bus signals must be amplified and conductors extended out of the chip through external pins. Amplifiers may be added to the source register:

Bus signals that exit microprocessor chips and other VLSI circuitry are electrically capable of traversing about one foot of conductor on a printed circuit board, or less if many devices are connected to it. Special buffer circuits may be added to boost the bus signals sufficiently for transmission over several additional feet of conductor length, or for distribution to many other chips (such as memory chips).

Noise and Electrical Distortion

Because of the very high switching rate and relatively low signal strength found on data, address, and other buses within a computer, direct extension of the buses beyond the confines of the main circuit board or plug-in boards would pose serious problems. First, long runs of electrical conductors, either on printed circuit boards or through cables, act like receiving antennas for electrical noise radiated by motors, switches, and electronic circuits:

Such noise becomes progressively worse as the length increases, and may eventually impose an unacceptable error rate on the bus signals. Just a single bit error in transferring an instruction code from memory to a microprocessor chip may cause an invalid instruction to be introduced into the instruction stream, in turn causing the computer to totally cease operation.

A second problem involves the distortion of electrical signals as they pass through metallic conductors. Signals that start at the source as clean, rectangular pulses may be received as rounded pulses with ringing at the rising and falling edges:

These effects are properties of transmission through metallic conductors, and become more pronounced as the conductor length increases. To compensate for distortion, signal power must be increased or the transmission rate decreased.

Special amplifier circuits are designed for transmitting direct (unmodulated) digital signals through cables. For the relatively short distances between components on a printed circuit board or along a computer backplane, the amplifiers are in simple IC chips that operate from standard +5v power. The normal output voltage from the amplifier for logic '1' is slightly higher than the minimum needed to pass the logic '1' threshold. Correspondingly for logic '0', it is slightly lower. The difference between the actual output voltage and the threshold value is referred to as the noise margin, and represents the amount of noise voltage that can be added to the signal without creating an error:

Transmission over Medium Distances (< 20 feet)

Computer peripherals such as a printer or scanner generally include mechanisms that cannot be situated within the computer itself. Our first thought might be just to extend the computer's internal buses with a cable of sufficient length to reach the peripheral. Doing so, however, would expose all bus transactions to external noise and distortion even though only a very small percentage of these transactions concern the distant peripheral to which the bus is connected.

If a peripheral can be located within 20 feet of the computer, however, relatively simple electronics may be added to make data transfer through a cable efficient and reliable. To accomplish this, a bus interface circuit is installed in the computer:

It consists of a holding register for peripheral data, timing and formatting circuitry for external data transmission, and signal amplifiers to boost the signal sufficiently for transmission through a cable. When communication with the peripheral is necessary, data is first deposited in the holding register by the microprocessor. This data will then be reformatted, sent with error-detecting codes, and transmitted at a relatively slow rate by digital hardware in the bus interface circuit. In addition, the signal power is greatly boosted before transmission through the cable. These steps ensure that the data will not be corrupted by noise or distortion during its passage through the cable. In addition, because only data destined for the peripheral is sent, the party-line transactions taking place on the computer's buses are not unnecessarily exposed to noise.

Data sent in this manner may be transmitted in byte-serial format if the cable has eight parallel channels (at least 10 conductors for half-duplex operation), or in bit-serial format if only a single channel is available.

Transmission over Long Distances (< 4000 feet)

When relatively long distances are involved in reaching a peripheral device, driver circuits must be inserted after the bus interface unit to compensate for the electrical effects of long cables:

This is the only change needed if a single peripheral is used. However, if many peripherals are connected, or if other computer stations are to be linked, a local area network (LAN) is required, and it becomes necessary to drastically change both the electrical drivers and the protocol to send messages through the cable. Because multiconductor cable is expensive, bit-serial transmission is almost always used when the distance exceeds 20 feet.

In either a simple extension cable or a LAN, a balanced electrical system is used for transmitting digital data through the channel. This type of system involves at least two wires per channel, neither of which is a ground. Note that a common ground return cannot be shared by multiple channels in the same cable as would be possible in an unbalanced system.

The basic idea behind a balanced circuit is that a digital signal is sent on two wires simultaneously, one wire expressing a positive voltage image of the signal and the other a negative voltage image. When both wires reach the destination, the signals are subtracted by a summing amplifier, producing a signal swing of twice the value found on either incoming line. If the cable is exposed to radiated electrical noise, a small voltage of the same polarity is added to both wires in the cable. When the signals are subtracted by the summing amplifier, the noise cancels and the signal emerges from the cable without noise:

A great deal of technology has been developed for LAN systems to minimize the amount of cable required and maximize the throughput. The costs of a LAN have been concentrated in the electrical interface card that would be installed in PCs or peripherals to drive the cable, and in the communications software, not in the cable itself (whose cost has been minimized). Thus, the cost and complexity of a LAN are not particularly affected by the distance between stations.

Transmission over Very Long Distances (greater than 4000 feet)

Data communications through the telephone network can reach any point in the world. The volume of overseas fax transmissions is increasing constantly, and computer networks that link thousands of businesses, governments, and universities are pervasive. Transmissions over such distances are not generally accomplished with a direct-wire digital link, but rather with digitally-modulated analog carrier signals. This technique makes it possible to use existing analog telephone voice channels for digital data, although at considerably reduced data rates compared to a direct digital link.

Transmission of data from your personal computer to a timesharing service over phone lines requires that data signals be converted to audible tones by a modem. An audio sine wave carrier is used, and, depending on the baud rate and protocol, will encode data by varying the frequency, phase, or amplitude of the carrier. The receiver's modem accepts the modulated sine wave and extracts the digital data from it. Several modulation techniques typically used in encoding digital data for analog transmission are shown below:

Similar techniques may be used in digital storage devices such as hard disk drives to encode data for storage using an analog medium.

Similar Documents

Premium Essay

Data Communication and Networking

... |3 | |PRACTICAL | |6 |MC9237 |Graphics Lab |0 |0 |3 |2 | |7 |MC9238 |Microprocessor Lab |0 |0 |3 |2 | |8 |MC9239 |Web Programming Lab |0 |0 |3 |2 | | TOTAL |15 |0 |9 |21 | MC9231 COMPUTER NETWORKS L T P C 3 0 0 3 UNIT I INTRODUCTION 9 Communication model – Data communications...

Words: 1592 - Pages: 7

Premium Essay

Data Communications and Networking

...COMP2330 Data Communications and Networking Written Assignment 1 Sample Solutions 1. Which of the OSI layers handles each of the following: (a) Dividing the transmitted bit stream into frames. (b) Determining which route through the subnet to use. (10 marks) Ans: a) Data Link Layer b) Network Layer 2. An image is 1024x768 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 56-kbps modem channel? Over a 1-Mbps cable modem? Over a 10-Mbps Ethernet? Over 100-Mbps Ethernet? (10 marks) Ans: The size of the image is 1024 x 768 x 3 x 8 = 18874368 bits. For a 56-kbps modem, it takes 18874368/56000 [pic] 337 seconds. For a 1-Mbps cable modem, it takes 18864368/106 [pic] 18.9 seconds. For a 10-Mbps Ethernet, it takes around 1.89 seconds. For a 100-Mbps Ethernet, it takes around 0.19 seconds. 3. A digital signaling system is required to operate at 9600bps. (10 marks) (a) If a signal element encodes a 4-bit word, what is the minimum required bandwidth of the channel if we assume a noise free system? (b) Repeat part (a) for the case of 8-bit words. Ans: Because we assume noise free, we can use Nyquist’s equation: C = 2B log2M. We have C = 9600 bps (a) log2M = 4, because a signal......

Words: 1205 - Pages: 5

Premium Essay

Data Communication and Networking summarized as a result of technical, political and economic reasons: The reasons for the popularity of TCP/ IP over the OSI are : * TCP/IP answers an immediate, almost desperate need - data communications in heterogeneous networks - very well. * It is relatively simple and robust compared to other alternatives. * TCP/IP is bundled into the Berkeley Software Distribution (BSD) Unix. Hence, TCP/IP became the minimum networking capability for any vendor entering the market for scientific and engineering graphics workstations. * Its available on virtually every hardware and operating system platform and It is often free as its open source. * Thus, it’s the lingua franca of the Internet. * It’s more credible than OSI, making greater utilization of bandwidth at a lower cost. * It supports multiplexing and being connectionless, supports more communication devices. * Existence of Internet layer reduces error handling overhead on the transport layer with the help of intelligent hosts, thus increasing throughput and efficiency at the transport layer. (b) List the major disadvantages with the layered approach to protocols. The disadvantages are : 1. Associated with layered protocols is that often higher layers of the protocol stack are unable to optimize data transfers based on the characteristics of underlying layers. 2. Each layer potentially imposes overhead both in terms of processing time and control information stored in protocol headers. ...

Words: 6005 - Pages: 25

Free Essay

Business Data Communications and Networking

...Business Data Communications and Networking 9th Edition Jerry Fitzgerald and Alan Dennis 1-1 Introduction to Data Communications 1-2 Outline • Brief history of Data Communications – Communications, Information Systems and the Internet • Data Communications Networks – Network components, network types • Network Models – OSI model, Internet model, transmission via “layers” • Network Standards – Standards making, common standards • Future Trends – Pervasive networking, integration of voice, video, and data, new information services 1-3 Information Age • First Industrial Revolution – Introduction of machinery – New organizational methods – Changed the way people worked • Second Industrial Revolution – Information Age – Introduction of computers – Introduction of networking and data communication – Changed the way people worked again • Faster communication  Collapsing Information lag • Brought people together  Globalization 1-4 The Collapsing Information Lag Historical developments in electronic communications telegraph sped up the rate and volume of transmission of information 1850 Information took days or weeks to be transmitted 1900 Information transmitted in minutes or hours 1950 2007 large quantities of information transmitted in a fraction of a second growth of telecommunications and especially computer networks Globalization of networks 1-5 Advances in Phone Technology Phone......

Words: 1962 - Pages: 8

Premium Essay

Data Communications and Networking by Behrouz A.Forouzan

...resources! Instructors and students using Data Communications and Networking, Fourth Edition by Behrouz A. Forouzan will find a wide variety of resources available at the Online Learning Center, www.mhhe.comlforouzan Instructor Resources Instructors can access the following resources by contacting their McGraw-Hill Representative for a secure password. PowerPoint Slides. Contain figures, tables, highlighted points, and brief descriptions of each section. Complete Solutions Manual. Password-protected solutions to all end-of-chapter problems are provided. a Pageout. A free tool that helps you create your own course website. D Instructor Message Board. Allows you to share ideas with other instructors using the text. a o Student Resources The student resources are available to those students using the book. Once you have accessed the Online Learning Center, click on "Student Resources," then select a chapter from the drop down menu that appears. Each chapter has a wealth of materials to help you review communications and networking concepts. Included are: Chapter Summaries. Bulleted summary points provide an essential review of major ideas and concepts covered in each chapter. a Student Solutions Manual. Contains answers for odd-numbered problems. Glossary. Defines key terms presented in the book. Flashcards. Facilitate learning through practice and review. a Animated Figures. Visual representations model key networking concepts, bringing them to life. D......

Words: 59848 - Pages: 240

Free Essay

Data Communication S and Networking Sixth Edition Case Project 7-1

...choose the tiered topology WAN, where the sites connected in star or ring formations are interconnected at different levels, with the interconnection points being organized into layers to form hierarchical groupings. Variations on this topology abound. Indeed, flexibility makes the tiered approach quite practical. A network architect can determine the best placement of top-level routers based on traffic patterns or critical data paths. In addition, tiered systems allow for easy expansion and inclusion of redundant links to support growth. On the other hand, their enormous flexibility means that creation of tiered WANs requires careful consideration of geography, usage patterns, and growth potential. As a Wan transmission I would choose the T-Carrier. T-carrier standards specify a method of signaling, which means they belong to the Physical layer of the OSI model. A T-carrier uses TDM (time division multiplexing) over two wire pairs (one for transmitting and one for receiving) to divide a single channel into multiple channels. Each channel may carry data, voice, or video signals. The medium used for T-carrier signaling can be ordinary copper wire, fiber-optic cable, or wireless links. So in this case I am going to use both - T1 and T3 transmissions to connect the central office with regional offices.  To connect the 150 home offices with the regional offices I am would use the DSL (digital subscriber line) Connection. DSL is a WAN connection and it operates over the......

Words: 369 - Pages: 2

Premium Essay

Introduction to Data Communication

...Introduction to Data Communication As the world of data communication and networking is changing a transformation of the marketing world is a challenge to stay connected with real world through devices in real time such as mobile phone, tablets, computers and laptops. The modern day marketing have to combine the creative side of discipline and this could be a huge challenge. Three areas of the changing transformation within the market of data communication are by speed, relevance and the reaches within campaigns which has increased greatly through different ways in which people may access the media, like through Facebook, YouTube, cell phones and computers. The changing system bring about a particular tool or system and for any brand of systems to work together in the networking world and brand teams of technologizes be placed to implement new systems. One such resource is “Organizational Challenges to the Adoption of the Internet” gives important update of the changes within the networking community. ( Current trends that affect the data communication are market trends in which these they show opportunities on how to grow business successfully and take advantages of the many positive changes and guard against the negative ones. While the market trend does effectively also inform it also save organizations from reacting to late when it comes to surprises that may occur while keeping ahead of the many competitors when developing business growth...

Words: 661 - Pages: 3

Premium Essay

The Effects of Social Networking to the Study Habit of 3rd Year Him Students

...THE EFFECTS OF SOCIAL NETWORKING TO THE STUDY HABIT OF 3RD YEAR HIM STUDENTS Introduction Background of the study The users of social networking sites build online profile and share information, including personal information, photographs and connect with other users, whether it is to communicate with old friends. Now a day’s social networking sites such as facebook, twitter, tumbler, MySpace, and others are attracting millions of people around the world, specially the students. Social networking sites had been the source of happiness for many students. Some play with the games or application available in social networking sites for the entertainment purposes. Some use social networking sites to connect with their old friends. Some also use it to meet new friends with the same interests. Once a person can be granted access to social networking websites, the person can begin to socialize. Socialization may include reading the profile pages of other members and possibly even containing them .But, others use this site just for fun. Social networking sites are not bad for students as long as they are not using it, excessively-social networking site can also help the students in their studies .Students use social networking site as a connection or communication to their other classmates .SNS’s can help them relieve stress .SNS’s are helpful in many ways .But ,nowadays students are addicted to this kinds of sites which led to low scores on test......

Words: 1018 - Pages: 5

Premium Essay

Computer Networks

...| Table of Contents Introduction 3 Computer and Networking. 3 Characteristics of Computer Networks. 3 Types of Computer Networks. 4  PAN (Personal Area Network) 4  LAN (Local Area Network) 5  MAN (Metropolitan Area Network) 5  WAN (Wide Area Network) 5  CAN (Campus Area Network) 5  SAN (Storage Area Network) 5 Why do we network our computers? 6 Peer-to-peer networking. 6 Computer Network Technologies 7 Conclusion: 8 Reference: 9 Introduction The purpose of the report is to survey and monitor the current state of computer network and the types of computer networks. This report is written by examining a range of recent published articles, magazine articles, and internet sites on the topic of computer networks used which are used commonly. The report is mainly about the types of computer network and their functions. Computer and Networking. A computer is a programmable machine, which is designed to sequentially and arithmetically carry out a sequence of logical operations. The particular sequence of operation allowing to solve more than one kind of problem. It responds to a specific set of instructions in a well defined manner. It can execute a pre-recorded list of instructions. Main components of computers are input, output and process. (Thakur) According to (Mitchell, What is (Wireless / Computer) Networking?) networking is linking or joining two or more computers with the purpose of sharing data. It consists of computers, wiring, and other......

Words: 1669 - Pages: 7

Premium Essay


...networks and key networking technologies? Answer: The principal components of telecommunications networks: Telecommunications are the means of electronic transmission of information over distances. The information may be in the form of voice telephone calls, data, text, images, or video. Today, telecommunications are used to organize more or less remote computer systems into telecommunications networks. These networks themselves are run by computers. A telecommunications network is an arrangement of computing and telecommunications resources for communication of information between distant locations. A telecommunications network includes the following components: Figure: principal components of a simple computer network 1. Computer: Computers that process information and are interconnected by the network 2. Network Interface: Each computer on the network contains a network interface device called a network interface card (NIC). 3. A Connection medium: The connection medium for linking network components can be a telephone wire, Coaxial cable or radio signal in the case of cell phone and wireless local area networks. 4. Network operating System software: The network operating system (NOS) routes and manages communications on the network and coordinates network resources. 5. Hub or switch: Hubs are very simple service that connects network components, sending packet of data to all other connected......

Words: 1634 - Pages: 7

Free Essay

Standard Research

...event and TO-DO information. 2. A standard PEER-TO-PEER protocol for common scheduling and calendaring transactions. 3. A standard access protocol that helps in the management of calendars, events and To-Dos over the internet. This protocols were called “Calendar Access Protocol” The working group was meant to develop and stabilize everything within six to nine months because there had been previous work done relating to this working group. THE NEED FOR THE IEEE 802 STANDARDS IN NETWORKING The IEE802 standard is a combination of networking standards that covers the physical layer selections of technologies from Ethernet to wireless. IEEE802 is subdivided into 22 parts from the major parts ; Ethernet 802.3 , Wi-Fi 802.11 , Bluetooth/Zigbee 802.15 and 802.16. The IEEE has done notable work in the standards area of networking. I thinking the IEEE puts better understanding to everything concerning networking involving the physical medium on which we move data or how data is placed on the network, how we make sure it remain in its right state and how it flows. IEEE802 shows or helps in the way Ethernet can be used. Ethernet LANs may use coax cable...

Words: 933 - Pages: 4

Premium Essay

Lan, Man and Wan

...LAN, MAN and WAN Computer networking is simply the communication between two or more computers that allow them to share information and hardware resources. This is really one of the most important contributions to the information age since personal computers were invented. The connection and communication of just two computers exchanging data and devices is the most fundamental of networking. The computer systems may communicate over a computer network and share their resources (Computer Network, 2009). A computer network can be wire and or wireless. When a network is wired, it uses cables to connect group of computers together to enable data communication. Wireless networks allow computers to communicate by using radio signals, so the computers aren't restricted by physical cables (Lowe, 2011). For example, it uses bluetooth, infrared rays and radio waves to send and receive signals over the network. Peer-to-peer (p2p) and client-server are the two computer networks in use today. In a p2p network, every computer has the same or equal capabilities and responsibilities. And with a client server it is nothing like peer-to-peer, some computers are the clients that request for resources and the servers make available the requested resources. There are many categories of computer networking, but the most common are local area network (LAN), metropolitan area network and wide area network (WAN). Local area networks (LANs) are private data communication networks that used......

Words: 1265 - Pages: 6

Premium Essay

Network Administrator

...:, MARITAL STATUS : SINGLE DATE OF BIRTH : 28/10/1984 PLACE OF BIRTH : KISII NATIONALITY : KENYAN LANGUAGES : ENGLISH AND KISWAHILI AGE : 26 YEARS ID NUMBER : 23769870 CARRIER OBJECTIVES To design and plan an advanced Telecom infrastructure that services over a million subscribers with ‎Triple Play Services (Voice, Data & Video Services).‎ To contribute to the growth of a progressive company with quality products and services in the field of Telecommunications and Information Technology (ICT).‎ SUMMARY OF SKILLS AND EXPERIENCE • Total 2 years and 4 months of experience with Advanced Diploma in Telecommunication Engineering and Cisco Certified Network Associate (CCNA). • 2 years and 8 months of experience as Network Engineer (Windows/Linux/Network). Possess the expertise in the following: Networking • Installations, Configurations and Troubleshooting of; • Wireless local Area network (WLAN) • Local Area Network (LAN) and Wide Area Network (WAN) Security • Wimax CPE (Alvarion) for SAFARICOM and ACCESSKENYA networks • Free Space Optic link (FSO) • Mikrotik CPE and router. • Nanostation 2.4Ghz and 5Ghz • Cisco routers and switches ...

Words: 1141 - Pages: 5

Premium Essay

Next Day Air Chapter 1

...system integration, and networking. Begin by explaining how each department uses information technology, what hardware it uses, and what functions currently are automated. Also assess which department is most in need of a network. NDAS was established in 1985. The main objective with NDAS is to compete in todays growing market for overnight package deliveries. The current state of automation varies among departments. Computers are linked to a LAN that only attends for Sales and Marketing. The Accounts Receivable Department, led by Jane Van Dyke, is accountable for all billing and collecting, as well as payroll.. The minicomputer that the company was using was recently replaced with a microcomputer server. An asset to this new server offers databases for bad debts and customer billing. The Fleet Maintenance, however, has no computer competence. The management in that department made a decision to track all the essential information manually. The remote offices currently communicate with corporate headquarters and each other via phone, fax, and mail. It is worth noting that there are desktop computers available in the remote offices, and a number of managers have laptop computers. Management realizes its need for regulating their systems, the equipment, and its procedures before any further networking can be proficient. The management also expect any of their systems to permit for development into other information technology areas of networking. 2. In......

Words: 639 - Pages: 3

Free Essay

Application Layer

...ABSTRACT Networking at engineering level is a complicated task. It involves software, firmware, chip level engineering, hardware and even electric pulses. To ease network engineering, the whole networking concept is divided into multiple layers. Each layer is involved in some particular task and is independent of all other layers. But as a whole the almost all networking task depends on all of these layers. Layers share data between them and they depend on each other only to take input and give output. In layered architecture of Network Models, one whole network process is divided into small tasks. Each small task is then assigned to a particular layer which works dedicatedly to process the task only. Every layer does only specific work. I have chooses application layer from the OSI model because the world experiences the Internet through the use of the World Wide Web, e-mail, and file-sharing programs. These applications, as well as others, provide the human interface to the underlying network, allowing you to send and receive information with relative ease. Most of the applications are intuitive; they can be accessed and used without the need to know how they work. As we continue to study the world of networking, it becomes more important to know how an application is able to format, transmit, and interpret messages that are sent and received across the network. INTRODUCTION Application layer is the highest most layers in OSI and TCP/IP layered model and this layer exists......

Words: 1147 - Pages: 5