Business Communication & Networking
Business Communication & Networking
Business Communication & Networking
Network:
A network is a set of devices (nodes) connected by communication links. A node can be a
computer, printer, or any other device capable of sending and / or receiving data generated
by other nodes on the network.
Gateways:
It is a hardware device that acts as a gate between two networks. It may be a router, firewall,
server or other device that enables traffic to flow in and out of the network. It protects
nodes within network.
Router:
It is a device that forwards data packets along networks. A network is connected to at least
two networks (two LAN’s or MAN’s) i.e router is connected between two different class
IP (internet protocol) addresses.
Multiple Access:
Multiple access techniques permit multiple access to a channel. A channel represents a
system resource assigned to a given mobile user that enables the user to establish
communication with other users in the network.
Depending on the channel type, specific multiple access technique can be used for
communication. The channel types and the associated multiple access techniques are
FDMA (Frequency Division Multiple Access), TDMA (Time Division Multiple Access),
CDMA (Code Division Multiple Access)
Network Applications:
• Resource sharing such as printers and storage devices.
• Exchange of information by means of e-Mails and FTP.
• Information sharing by using Web or Internet.
• Interaction with other users using dynamic web pages.
• IP phones.
• Video conferences.
• Parallel computing.
• Instant messaging
1
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Network Topology:
Network topology refers to the layout of connected devices, i.e. how the computers, cables,
and other components within a data communications network are interconnected, both
physically and logically.
Two most basic topologies are point-to-point and multipoint.
• A point to-point topology usually connects two mainframe computers for high-speed
digital information.
• A multipoint topology connects three or more stations through a single transmission
medium and some examples are star, bus, ring, mesh and hybrid.
Types of Topologies:
Star topology:
A star topology is designed with each node (file server, workstations, and peripherals)
connected directly to a central network hub, switch, or concentrator. Data on a star network
passes through the hub, switch, or concentrator before continuing to its destination. The
hub, switch, or concentrator manages and controls all functions of the network. It also acts
as a repeater for the data flow.
Advantages:
• Easily expanded without disruption to the network.
• Cable failure affects only a single user.
• Easy to trouble shoot and isolate problems.
Disadvantages:
• Requires more cable.
• A central connecting device allows for a single point of failure.
• More difficult to implement.
2
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Bus topology:
Bus networks use a single cable, (the backbone) functions as a shared communication
medium that devices attach or tap into with an interface connector. A device wanting to
communicate with another device on the network sends a broadcast message onto the wire
that all other devices see, but only the intended recipient actually accepts and processes the
message. The two ends of the transmission line never touch to form a complete loop
Advantages:
• Cheap and easy to implement.
• Require less cable.
• Does not use any specialized network equipment.
Disadvantages:
• Network disruption when computers are added or removed.
• A break in the cable will prevent all system from accessing the network.
• Difficult to trouble shoot.
Ring topology:
In a ring network (sometimes called a loop), every device has exactly two neighbours for
communication purposes. All messages travel through a ring in the same direction (either
"clockwise" or "counter clockwise"). All the stations are interconnected in tandem (series)
to form a closed loop or circle. Each computer acts like a repeater and the ring topology is
similar to bus or star topologies.
Advantages:
• Cable faults are easily located and makes trouble shooting easier.
• Networks are moderately easy to install.
3
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Disadvantages:
• Expansion to the network can cause network disruption.
• A single break in the cable can disrupt the entire network.
Mesh topology:
In mesh topology each computer on the network connects to every other, creating a point-
to-point connection between every device on the network. A mesh network can take any
of several possible paths from source to destination. A mesh network in which every device
connects to every other is called a full mesh. A disadvantage is that, a mesh network with
n nodes must have n(n-1)/2 links and each node must have n-1 I/O ports (links).
Advantages:
• Provides redundant paths between devices.
• The network can be expanded without disruption to current uses.
Disadvantages:
• Requires more cable than the other LAN topologies.
• Complicated implementation.
Tree Topology:
It is also known as Hierarchical Topology. This topology imitates as extended Star
topology and inherits properties of Bus topology. This topology divides the network into
multiple levels/layers of network. If the root goes down, then the entire network suffers
even though it is not the single point of failure.
Advantages:
• Expansion of network is possible and easy.
• Networks are divided into segments, that can be easily maintained.
4
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
• Each segment is provided with dedicated point-to-point wiring to the central hub.
• If one segment is damaged, other segments are not affected.
Disadvantages:
• Relies heavily on the main bus cable, if it breaks whole network is crippled.
• If more nodes and segments are added then maintenance becomes difficult.
• Heavy traffic causes the network and make it slow.
Hybrid topology:
This topology (sometimes called mixed topology) is simply combining two or more of the
traditional topologies to form a larger, more complex topology. Main aim is being able to
share the advantages of different topologies.
Network Classification:
Network can be classified as
• PAN – Personal Area Network
• LAN - Local Area Network
• MAN - Metropolitan Area Network
• WAN - Wide Area Network
Personal Area Network (PAN): A Personal Area
Network (PAN) is smallest network which is very
personal to a user. This may include Bluetooth enabled
devices or infra-red enabled devices. PAN has
connectivity range up to 10 meters. PAN may include
wireless computer keyboard and mouse, Bluetooth
enabled headphones, wireless printers, and TV remotes.
5
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Local Area Network (LAN):
A local area network (LAN) is a network that connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building, or closely
positioned group of buildings. LANs use a network operating system to provide two-way
communications at bit rates in the range of 10 Mbps to 100 Mbps. LAN has connectivity
range from 10 meters to 1000 meters.
Advantages of LAN:
• Share resources efficiently.
• Individual workstation might survive network failure if it doesn’t rely upon others.
• Component evolution independent of system evolution.
• Support heterogeneous hardware/software.
• Access to other LANs and WANs.
• High transfer rates with low error rates.
Disadvantages of LAN:
• Limited Area.
• Risk of complete breakdown.
• Sharing of data from outside.
Metropolitan Area Network:
A MAN is optimized for a larger geographical area than a LAN, ranging from several
blocks of buildings to entire cities. Its geographic scope falls between a WAN and LAN.
A MAN usually interconnects a number of local area networks (LANs) using a medium
such as fiber-optical links. MANs typically operate at speeds of 1.5 Mbps to 10 Mbps and
range from 1km to 10km.
6
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Advantages of MAN:
• Less expensive.
• Sending local emails.
• High Speed.
• Sharing of the internet.
• High Security.
Disadvantages of MAN:
• Difficult to manage.
• Internet speed difference.
• Hackers attack.
• More wires required.
• Technical people required to setup.
Wide Area Network:
Wide area networks are the oldest type of data communications network that provide
relatively slow-speed, long-distance transmission of data, voice and video information over
relatively large and widely geographical areas, such as country or entire continent. WANs
interconnect routers in different locations. WANs tend to use technology like ATM
(Asynchronous Transfer Mode), Synchronous Optical Network (SONET) and Frame
Relay. LAN has connectivity range from 100km to 1000 km.
Advantages of WAN:
• Centralizes IT infrastructure.
• Boosts privacy.
• Increases bandwidth.
• Increase profits.
Disadvantages of WAN:
• High setup costs.
• Security Concerns.
• Maintenance issues.
7
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Internetwork (Internet):
A network of networks is called an internetwork, or simply the internet. It is the largest
network in existence on this planet. The internet hugely connects all WANs and it can have
connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP
as its addressing protocol. Internet enables the users to share and access enormous amount
of information worldwide. It uses WWW, FTP, email services, audio, and video streaming
etc.
Services of Internet:
• Web sites
• E-mail
• Instant Messaging
• Blogging
• Social Media
• Marketing
• Networking
• Resource Sharing
• Audio and Video Streaming
A Telnet program allows a user on one system to login to a remote system and issue
commands in a command window of the remote system.
TELNET may be used across WAN’s as well as LAN's.
8
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
FTP (File Transfer Protocol):
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer
of computer files between a client and server on a computer network.
FTP is a client-server model architecture using separate control and data connections
between the client and the server. FTP users may authenticate using sign-in protocol, i.e
using username and password. FTP is a standard internet protocol provided by TCP/IP
used for transmitting the files from one host to another.
Switching:
Switching is a mechanism by which data/information sent from source towards destination
have to pass through the interconnecting devices, which receives data from the source,
stores data, analyse it and then forwards to the next interconnecting device closest to the
destination.
Switching can be categorized as:
Circuit Switching:
When computer places a telephone call, the switching equipment within the telephone
system seeks out a physical path all the way from your telephone to the receiver's
telephone. This technique is called circuit switching
9
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Each of the six rectangles represents a carrier switching office (end office, toll office, etc.).
In this example, each office has three incoming lines and three outgoing lines. When a call
passes through a switching office, a physical connection is (conceptually) established
between the line on which the call came in and one of the output lines, as shown by the
dotted lines. An important property of circuit switching is the need to set up an end-to-end
path before any data can be sent. The elapsed time between the end of dialling and the start
of ringing can easily be 10 sec, more on long-distance or international calls. During this
time interval, the telephone system is hunting for a path. Note that before data transmission
can even begin, the call request signal must propagate all the way to the destination and be
acknowledged.
Message Switching:
An alternative switching strategy is message switching. When this form of switching is
used, no physical path is established in advance between sender and receiver. Instead, when
the sender has a block of data to be sent, it is stored in the first switching office (i.e., router)
and then forwarded later, one hop at a time. Each block is received in its entirety, inspected
for errors, and then retransmitted. A network using this technique is called a store-and-
forward network.
The first electromechanical telecommunication systems used message switching, namely,
for telegrams. The message was punched on paper tape (off-line) at the sending office, and
then read in and transmitted over a communication line to the next office along the way,
where it was punched out on paper tape. An operator there tore the tape off and read it in
on one of the many tape readers, one reader per outgoing trunk. Such a switching office
was called a torn tape office. Paper tape is long gone and message switching is not used
any more.
Packet switching:
The alternative to circuit switching is packet switching, with this technology, individual
packets are sent as need be, with no dedicated path being set up in advance. It is up to each
packet to find its way to the destination on its own. With message switching, there is no
limit at all on block size, which means that routers (in a modern system) must have disks
to buffer long blocks. It also means that a single block can tie up a router-router line for
minutes, rendering message switching useless for interactive traffic.
Packet-switching networks place a tight upper limit on block size, allowing packets to be
buffered in router main memory instead of on disk. By making sure that no user can
monopolize any transmission line very long (milliseconds), packet-switching networks are
10
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
well suited for handling interactive traffic. The first packet of a multipacket message can
be forwarded before the second one has fully arrived, reducing delay and improving
throughput. For these reasons, computer networks are usually packet switched,
occasionally circuit switched, but never message switched.
11
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Key factors in communication evolution:
There are four key factors in communication evolution
1. Role of technology
Technology always plays a role in determining what can be built. The capabilities
of various technologies have improved dramatically over the past two centuries.
These improvements in capabilities have been accompanied by reductions in cost.
As a result, many systems that were simply impossible two decades ago have
become not only feasible but also cost-effective. Of course, fundamental physical
considerations place limits on what technology can ultimately achieve. For example,
no signal can propagate faster than the speed of light, and hence there is a minimum
delay or latency in the transfer of a message between two points a certain distance
apart. However, while bounded by physical laws, substantial opportunities for
further improvement in enabling technologies remain.
2. Role of regulation
Traditional communication services in the form of telephony and telegraphy have
been government regulated. Because of the high cost in deploying the requisite
infrastructure and the importance of controlling communications, governments often
chose to operate communications networks as monopolies. The planning of
communication networks was done over time horizons spanning several decades.
This planning accounted for providing a very small set of well-defined
communication services, for example, telegraph and "plain-old telephone service"
(POTS). These organizations were consequently not very well prepared to introduce
new services at a fast rate.
3. Role of market
The existence of a market for a new service is the third factor involved in
determining the success of a new service. This success is ultimately determined by
a customer's willingness to pay, which, of course, depends on the cost, usefulness,
and appeal of the service. For a network-based service, the usefulness of the service
frequently depends on there being a critical mass of subscribers.
4. Role of standards
Standards are basically agreements, with industrywide, national, and possibly
international scope, that allow equipment manufactured by different vendors to be
interoperable. Standards focus on interfaces that specify how equipment is
physically interconnected and what procedures are used to operate across different
equipment. Standards applying to data communications between computers specify
the hardware and software procedures through which computers can correctly and
reliably "talk to one another." Standards are extremely important in communications
where the value of a network is to a large extent determined by the size of the
community that can be reached. In addition, the investment required in
12
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
telecommunications networks is very high, and so network operators are particularly
interested in having the choice of buying equipment from multiple, competing
suppliers, rather than being committed to buying equipment from a single supplier.
The entities comprising the corresponding layers on different machines are called peers. In
other words, it is the peers that communicate using protocols. In reality, no data is
transferred from layer n on one machine to layer n of another machine. Instead, each layer
passes data and control information to the layer immediately below it, until the lowest layer
is reached. Below layer-1 is the physical layer through which actual communication
occurs. With layered architectures, communications between two corresponding layers
requires a unit of data called a protocol data unit (PDU). A PDU can be a header added at
the beginning of a message or a trailer appended to the end of a message. Data flows
downward through the layers in the source system and upwards at the destination address.
As data passes from one layer into another, headers and trailers are added and removed
from the PDU. This process of adding or removing PDU information is called
encapsulation/decapsulation. Between each pair of adjacent layers there is an interface.
The interface defines which primitives operations and services the lower layer offers to the
upper layer adjacent to it. A set of layers and protocols is known as network architecture.
A list of protocols used by a certain system, one protocol per layer, is called protocol stack.
13
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
The basic elements of a layered model are services, protocols and interfaces.
• A service is a set of actions that a layer offers to another (higher) layer.
• Protocol is a set of rules that a layer uses to exchange information with a peer entity.
These rules concern both the contents and the order of the messages used. Basically,
a protocol is an agreement between the communicating parties on how
communication is to proceed.
• Between the layers service interfaces are defined. The messages from one layer to
another are sent through those interfaces.
OSI (Open Systems Interconnection) reference model:
The OSI reference model divides the problem of moving information between computers
over a network into SEVEN smaller and more manageable problems. The seven layers are:
OSI reference model:
Physical Layer:
The physical layer is responsible for transmitting individual bits from one node to the next.
The physical layer is the lowest layer of the OSI hierarchy and coordinates the functions
required to transmit a bit stream over a physical medium. It also defines the procedures
and functions that physical devices and interfaces have to perform for transmission occur.
The physical layer specifies the type of transmission medium and the transmission mode
14
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
(simplex, half duplex or full duplex) and the physical, electrical, functional and procedural
standards for accessing data communication networks.
Data-link Layer:
The data link layer is responsible for transmitting frames from one node to the next. The
data link layer transforms the physical layer, a raw transmission facility, to a reliable link
and is responsible for node-to-node delivery. It makes the physical layer appear error free
to the upper layer (network layer). The data link layer packages data from the physical
layer into groups called blocks, frames or packets. If frames are to be distributed to
different systems on the network, the data link layer adds a header to the frame to define
the physical address of the sender (source address) and/or receiver (destination address) of
the frame. The data-link layer provides flow-control, access-control, and error-control.
Network Layer:
It is responsible for the delivery of individual packets from the source host to the
destination host. The network layer provides details that enable data to be routed between
devices in an environment using multiple networks, subnetworks or both. This is
responsible for addressing messages and data so they are sent to the correct destination,
and for translating logical addresses and names (like a machine name FLAME) into
physical addresses. This layer is also responsible for finding a path through the network to
the destination computer. It provides the upper layers of the hierarchy with independence
from the data transmission and switching technologies used to interconnect systems.
Networking components that operate at the network layer include routers and their
software.
Transport Layer:
It is responsible for delivery of a message from one process to another. The transport layer
controls and ensures the end-to-end integrity of the data message propagated through the
network between two devices, providing the reliable, transparent transfer of data between
two endpoints.
Transport layer responsibilities includes message routing, segmenting, error recovery and
two types of basic services to an upper-layer protocol: connection oriented and
connectionless. The transport layer is the highest layer in the OSI hierarchy in terms of
communications and may provide data tracking, connection flow control, sequencing of
data, error checking, and application addressing and identification.
Session Layer:
It is responsible for dialog control and synchronization. Session layer, sometimes called
the dialog controller provides mechanism for controlling the dialogue between the two end
systems. It defines how to start, control and end conversations (called sessions) between
applications.
15
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Session layer protocols provide the logical connection entities at the application layer.
These applications include file transfer protocols and sending email. Session
responsibilities include network log-on and log-off procedures and user authentication.
Session layer characteristics include virtual connections between applications, entities,
synchronization of data flow for recovery purposes, creation of dialogue units and activity
units, connection parameter negotiation, and partitioning services into functional groups.
Presentation Layer:
It is responsible for translation, compression, and encryption. It provides the presentation
layer provides independence to the application processes by addressing any code or syntax
conversion necessary to present the data to the network in a common communications
format. It specifies how end-user applications should format the data.
The presentation layer translated between different data formats and protocols.
Presentation functions include data file formatting, encoding, encryption and decryption of
data messages, dialogue procedures, data compression algorithms, synchronization,
interruption, and termination.
Application Layer:
It is responsible for providing services to the user. The application layer is the highest layer
in the hierarchy and is analogous to the general manager of the network by providing access
to the OSI environment. The applications layer provides distributed information services
and controls the sequence of activities within and application and also the sequence of
events between the computer application and the user of another application.
The application layer communicates directly with the user’s application program. User
application processes require application layer service elements to access the networking
environment. The service elements are of two types: CASEs (common application service
16
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
elements) satisfying particular needs of application processes like association control,
concurrence and recovery. The second type is SASE (specific application service elements)
which include TC P/IP stack, FTP, SNMP, Telnet and SMTP.
Internet
Host to
Network
TCP / IP reference model has four layers – Application, Transport, Network and Host to
Network
Application Layer:
It contains all the high-level protocols. It includes virtual terminal (TELNET), File
Transfer Protocol (FTP), electronic mail – Simple Mail Transfer Protocol (SMTP), DNS
(Domain Name Service) and HTTP (Hyper Text Transfer Protocol).
The virtual terminal protocol allows a user on one machine to log into a distant machine
and work there. The File Transfer Protocol provides a way to move data efficiently from
one machine to another. Electronic mail allows to send mail from one user to another user.
Domain Name Service is used for mapping host names onto their network addresses. HTTP
is used for fetching pages on the world wide web.
17
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Transport Layer:
It is designed to allow peer entities on the source and destination hosts to carry on a
conversation. There are two protocols –
• Transmission Control Protocol (TCP) – It is a reliable connection – oriented protocol
that allows a byte stream originating on one machine to be delivered without error
on any other machine in the internet.
• User Datagram Protocol (UDP) – It is an unreliable, connectionless protocol for
applications that do not want TCP’s sequencing or flow control and wish to provide
their own. It is also used for Client- Server type. It is used in the applications in
which prompt delivery is more important than accurate delivery (Ex. Transmitting
speech or video).
Internet Layer:
Its job is to permit hosts to inject packets into any network and have them travel
independently to the destination. They may arrive in different order than they were sent.
The job of the internet layer is to deliver IP packets where they are supposed to go. It
handles the issues of avoiding congestion and packet routing. The specific protocol that
governs this layer is called the Internet protocol (IP).
Host to Network Layer:
The network access layer also called the host-to-network layer is concerned with all of the
issues of physically delivering data packets using frames or cells. The host has to connect
to the network using some protocol such that it can send IP packets over it. These protocols
vary from host to host and network to network.
Differences between OSI and TCP/IP
• TCP/IP combines the presentation and session layer issues into its application layer
• TCP/IP combines the OSI data link and physical layers into one layer
• TCP/IP appears simpler because it has fewer layers
• TCP/IP protocols are the standards around which the Internet developed, so the
TCP/IP model gains credibility just because of its protocols.
18
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Transmission medium
Transmission media is a communication channel that carries the information from the
sender to the receiver.
Routing control
A routing control is the process to control and monitors all the outgoing traffic through its
connection with the Internet service providers (ISPs), and helps in selecting the best path
for efficient delivery of the data.
Bit rate (Data Rate)
It is defined as the transmission of number of bits per second. OR
It is the number of bits that pass a given point in a telecommunication network in a given
amount of time.
Bit Rate = Baud rate x the number of bit per baud
Baud Rate
It is defined as the number of signal units per second.
Baud Rate = Bit Rate / the number of bit per baud
Bandwidth
It is the maximum amount of data that can be transmitted in a fixed amount of time or
range within a band of frequencies or wavelengths.
Sampling
Sampling is defined as, “The process of measuring the instantaneous values of
continuous-time signal in a discrete form.”
Or
A piece of data taken from the whole data which is continuous in the time domain is called
sampling.
19
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Transmission Impairment
If the signals sent at the beginning of the medium is not the same as the signal at the end
of the medium it is known as transmission impairment.
There are 3 types of impairment – attenuation, distortion and noise.
Attenuation
It refers to a reduction in signal strength while transmitting analog or digital signals over
long distances.
Distortion
Distortion is the alteration of the original shape of the signal during transmission of the
data.
Noise
It is an unwanted electrical or electromagnetic energy that degrades the quality of signals
and data.
Latency
It is the amount of time a message or packet of data takes to traverse from one designated
point to another.
Block coding
It is a technique of adding extra bits to a digital word in order to improve the reliability
of transmission. It consists of the message bits and code bits.
What is an error in the communication media? What are the different methods
used to detect these errors?
An error is said to occur when the receiver’s information does not match with the sender’s
information.
(During transmission, digital signals suffer from noise that can introduce errors in the binary bits travelling from
sender to receiver. That means a 0 bit may change to 1 or a 1 bit may change to 0.)
Different types of error detection methods are - Simple Parity check, Two-dimensional
Parity check, Checksum, Cyclic redundancy check.
What is parity check? Why it is used?
Parity check is the process that ensures accurate data transmission between sender and the
receiver during communication where a parity bit (1 or 0) is added to the original data bits
to make the total number of 1’s as even (or odd) number of 1’s. It is used to detect the
errors.
22
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Write the difference between analog and digital signal?
Analog Signals Digital Signals
Analog signals are continuous sine waves Digital signals are square waves.
Less secure More secure
Uses low bandwidth Uses high bandwidth
Higher rate transmission Lower rate transmission
Example: Human voice, natural sound, Example: Computers, optical drives, and
analog electronic devices. other electronic devices.
23
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Write short notes on satellite communication.
A communications satellite is an artificial satellite that amplifies radio signals through
a transponder and it creates a communication channel between a source transmitter and
a receiver at different locations on Earth. Communication satellites are used
for television, telephone, radio, internet, and military applications.
Communication satellites are of three types
• Low earth orbit satellites – it is a circular orbit about 160 km to 2000 km above the
earth’s surface.
• Medium earth orbit satellites – it is a circular orbit about 2000km to 35000km above
the earth’s surface.
• Geo-stationary satellites – it is a circular orbit above 35000km. These satellites will
be in geo-stationary orbit that is the satellite’s orbital period is the same as the
rotation rate of the earth.
Explain ARPANET.
ARPANET was the network that became the basis for the Internet. Based on a concept first
published in 1967, ARPANET was developed under the direction of the U.S. Advanced
Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the
interconnection of four university computers. The initial purpose was to communicate and
share computer resources among mainly scientific users at the connected institutions.
ARPANET took advantage of the new idea of sending information in small units
called packets that could be routed on different paths and reconstructed at their destination.
The development of the TCP/IP protocols in the 1970s made it possible to expand the size
of the network, which now had become a network of networks.
ARPA did its work by issuing grants and contracts to universities, later Larry Roberts
turned to networking which was known as ARPANET.
In ARPANET the subnet would consists of minicomputers called IMP’s (Interface
Message Processors) connected by 56 kbps transmission lines. For high reliability each
IMP would be connected to at least two other IMP’s because if any IMP is destroyed then
messages could be automatically rerouted along alternative paths.
24
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Explain NSFNET
The National Science Foundation Network (NSFNET) is a wide area network that was
developed by the National Science Foundation to replace ARPANET as the main network
linking government and research facilities. NSF decided to build a backbone network to
connect its six supercomputer centers. Each supercomputer is connected with a
microcomputer called fuzzball.
The fuzzballs were connected with 56 kbps leased lines and formed the subnet. NSF also
funded some regional networks that connected to the backbone to allow users of
Universities, research labs and libraries to access any of the supercomputers and to
communicate with one another. The computer network including the backbone and the
regional networks was called NSFNET.
25
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Explain SONET.
SONET (Synchronous Optical Network) - SONET is a communication protocol
developed by Bellcore. It is used to transmit a large amount of data over large distances
using optical fibre. With SONET multiple digital data streams are transferred at the same
time over the optical fibre.
SONET is used to convert electrical signal into optical signal so that it can travel longer
distances.
❖ STS Multiplexer:
It performs multiplexing of signals and it converts electrical signal to optical signal
❖ STS Demultiplexer:
It performs demultiplexing of signals and it converts optical signal to electrical
signal
❖ Regenerator:
It is a repeater that takes an optical signal and regenerates it.
❖ Add/Drop Multiplexer:
It allows to add signals coming from different sources into a given path or remove
a signal.
Advantages of SONET:
• Transmits data to large distances
• Low electromagnetic interference
• High data rates
• Large Bandwidth
26
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Explain the different guided media used in data communication.
The different guided media used in data communication are –
1) Twisted Pair 2) Coaxial Cable 3) Optical Fiber
1) Twisted Pair Cable:
In twisted pair technology, the two copper wires (conductors) are ``twisted'' together
in a helix to reduce interference between the two conductors. The Twisted-pair can
be used for both analog and digital communication. There are two types of twisted
pair cables – unshielded and shielded twisted pair. The twisted pair cables are
commonly used in telephone system. It can transmit the signal at a speed of 10 Mbps
over a short distance. Example: Category 3 and Category 5 cables.
2) Coaxial Cable (Coax):
27
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
An optical fiber is a long, thin strand of clear material. In the center, it has a core
and around the core there is a layer called the cladding. The core and cladding are
made-up of different kinds of glass or plastic, so that light travels slower in the core
than it does in the cladding. If the light in the core hits the edge of the cladding then
the light will be returned into the core. No light escapes until it comes to the end of
the fiber. A plastic coating called the buffer covers the cladding to protect it. The
buffered fiber is covered by a tougher layer called the jacket. The jacket protects the
fiber to break. It uses total internal reflection technique.
29
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
What is an Error?
If the data alters one or more bits during transmission from one node to the other it is
known as error.
Types of error
There are two types of errors – single bit error and burst error
Single bit error
If 1 bit of the data changes during transmission (i.e from 1 to 0 or 0 to 1) then this type of error
is called single bit error.
Burst error
If more than one bit the data changes during transmission then this type of error is called
burst error.
30
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
What is error detection? Explain simple and two-dimensional parity check method.
Error Detection is a method where the errors in the frames are identified at the receiver
end.
Single parity check: It is also known as simple parity check. In this technique, a redundant
bit (parity bit) is attached at the end of the data so that the number of 1’s becomes even.
Therefore, it is known as even parity checking.
If the number of 1’s bits is odd, then parity bit 1 is attached and if the number of 1’s bits is
even, then parity bit 0 is attached at the end of the data. At the receiving end, the parity bit
is calculated from the received data bits and compared with the received parity bit.
31
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Drawbacks of 2D Parity Check
• If two bits in one data unit are corrupted and two bits exactly the same position in another
data unit are also corrupted, then 2D Parity checker will not be able to detect the error.
• This technique cannot be used to detect the 4-bit errors or more in some cases.
32
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
What is polynomial code? Explain CRC with example.
A polynomial code is a linear code which will be having a valid code word comprises of
polynomials (dividend) which are divide by a shorter polynomial (generator).
Cyclic redundancy check (CRC):
CRC is based on binary division. In CRC, each station will be having a fixed divisor
polynomial code (generator) which will be shorter comparable to the data polynomial code.
If there are ‘n’ number of bits in the generator then n-1 number of 0’s will be added to the
data bits. Now the data bits including the 0’s will be divided by the generator, X-OR is
done for subtracting during division. Now the remainder will be added to the data including
0’s. This message will be transmitted from the sender. At the receiver the message will be
divided by the same divisor (generator). If the remainder after division is zero then the data
is assumed to be correct and therefore it is accepted else it will be rejected.
Let the original message will be 1010000 and the generator polynomial be x 3+1 (1001)
(* @ represents XOR)
33
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
What is multiplexing? Explain the different multiplexing techniques.
Multiplexing is the process of combining multiple signals into one signal, over a common
shared transmission medium.
Different types of multiplexing techniques are –
FDM (Frequency Division Multiplexing)
TDM (Time Division Multiplexing)
WDM (Wavelength Division Multiplexing)
35
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Each telephone has two copper wires coming out of it that go directly to the telephone
company’s nearest local office which is called End office. The two wire connections
between each telephone and the end office are known as local loop. Each end office has a
number of outgoing lines to one or more switching centres, called toll offices. These lines
are called toll connecting trunks. If the caller and the receiver do not have common toll
office then the path will have to be established with a inter-toll trunks called intermediate
switching office.
In telephone network it should be made clear who could do what the areas were divided
into LATA’s (Local Access and Transport Areas). LATA is a area covered by one area
code. Within LATA there will be LEC (Local Exchange Carrier). All the inter-LATA
traffic will be handled by IXC (Inter eXchange Carrier). Any IXC which handles calls
starting from LATA can build a switching office called POP (Point of Presence).
36
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
3. What is ARQ?
Automatic repeat request (ARQ) is a protocol in which the sender waits for a positive
acknowledgement before transmitting the next frame. In ARQ, when the receiver detects an
error in a packet, it automatically requests the transmitter to resend the packet. This process
is repeated until the packet is error free or till a predetermined number of transmissions.
4. What is HDLC
High-level Data Link Control (HDLC) is a group of communication protocols of the
data link layer for transmitting data between different network points or stations. In
HDLC the frame is transmitted through the network to the destination, which verifies
whether the frame has successfully arrived at the destination. (It is a bit - oriented protocol that
is applicable for both point - to - point and multipoint communications.)
5. What is PPP?
Point-to-Point Protocol (PPP) is a data link layer protocol which acts between two
routers directly without any host or any other networking in between. It can provide
connection authentication, transmission encryption, and compression.
37
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
7. What is Time recovery in synchronization?
Time recovery in synchronization is the process of getting the timing information, when
a serial communication channel does not transmit the clock signal along with the data
stream then the timing must be regenerated at the receiver.
(Types of ARQ
• Stop-and-wait
• Go-back-N
• Selective Repeat)
Stop – and – Wait protocol is data link layer protocol used for transmission of the frames
over noisy channels. It provides unidirectional data transmission with flow control and
error control facilities. It is used in connection-oriented communication. It implements
sliding window protocol concept with window size 1.
39
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
2 MARKS QUESTIONS:
1. What is meant by multiple access?
Multiple access is a technique that permits the available bandwidth to be used
simultaneously by different users. (Or Multiple access is a technique that permits
various stations to connect to the same transmission medium (channel) to transmit the
data over it and share its capacity.)
2. What is FDMA?
Frequency-division multiple access (FDMA) allows multiple users to send data through
a single communication channel, by dividing the bandwidth of the channel into separate
non-overlapping frequencies.
3. Define polling?
It is a technique that identifies when a terminal (station) is ready to send the data. In this
technique one station will act as a controller, which will periodically check all the
stations whether they have any data to transmit.
5. What is a token?
A token is a special frame that is passed from node to node around a ring network. When
it gets to a node which has some data to be transmitted, the node accepts this frame and
starts transmitting the data.
40
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
7. What is scheduling access control?
In Scheduling Access Control (also called Controlled Access), the stations seek
information from one another to find which station has the right to transmit the data. It
allows only one node to send the data at a time which avoids the collision of messages
on the shared medium.
(The different types of Scheduling are- Reservation, Polling and Token Passing.)
4 MARKS QUESTIONS:
1. Explain wireless LAN.
Wireless LAN stands for Wireless Local Area Network. It is also called LAWN (Local
Area Wireless Network). WLAN is one in which a mobile user can connect to a Local
Area Network (LAN) through a wireless connection.
Wireless LANs provide high speed data communication in small areas such as building
or an office. WLANs allow users to move around in a confined area while they are still
connected to the network.
Wireless LAN technology is used to save cost and avoid laying the cables. It also
provides high-speed internet access to the public (Wi-fi).
The IEEE 802.11 standards defines the technologies for wireless LANs. For sharing of
the paths, it uses the Ethernet protocol and CSMA/CA (carrier sense multiple access
with collision avoidance).
42
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
2. Write short notes on timing jitter.
Timing Jitter is the variation in the packet arrival time. It is a delay problem in the overall
transmission of the data. If there are different packets of data which is transmitted from
the transmitter and if these packets are delayed to reach at the destination then there will
be time sensitivity this problem is known as time jitter.
Let us consider that first packet arrives the destination system at 1s delay and second
packet arrives at 5s delay, and let the propagation time is 10s then first packet arrives at
11s (propagation time + delay time = 10s+1s) whereas the second packet arrives at 15s
(propagation time + delay time = 10s+5s) so there is a gap of 4s in between first packet
and second packet. This gap of arrival of different packets is called timing jitter. Timing
jitter can easily be identified in case of audio and video packets.
• The primary function of LLC is to multiplex protocols over the MAC layer while
transmitting and likewise to de-multiplex the protocols while receiving.
43
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
8 MARKS QUESTIONS:
1. Explain pure ALOHA and slotted ALOHA or write short notes on ALOHA
Pure ALOHA:
The original ALOHA protocol is called pure ALOHA. In this protocol each station sends
a frame whenever it has frame to send. As there will be only one channel to be shared
by many stations so there is the possibility of collision between the frames.
Let us consider that there are 4 stations which are sharing a common channel and each
station sends two frames. Some of the frames collide because of multiple frames at a
particular contention. According to the above diagram only frame 1.1 from station 1 and
frame 2.2 from station 2 will arrive the destination without collision, rest all frames will
collide. In pure ALOHA the receiver sends the acknowledgement whenever a frame
reaches the destination.
The probability that k frames are generated during a given frame time is given by
𝐺 𝑘 𝑒 −𝐺
Pr[𝑘] =
𝑘!
Where G = attempts per packet time
The probability when there is no traffic during vulnerable period is 𝑃𝑜 = 𝑒 −2𝐺 .
Throughput per frame time (S) = 𝐺𝑃𝑜 , i.e 𝑆 = 𝐺𝑒 −2𝐺 . The maximum throughput occurs
at G=0.5 i.e S = 0.184 (18%)
Slotted ALOHA:
In slotted ALOHA the time is divided into slots and the stations can only send the frames
at the beginning of the time slot and only one frame is sent in each slot.
44
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
In slotted ALOHA, if any station is not able to place the frame onto the channel at the
beginning of the slot then it misses that time slot and then the station has to wait until
the next time slot. But still there is a possibility of collision, if two stations try to send
at the same time slot, Example as frame 1.2 of station 1 and frame 3.1 of station 3 will
collide.
The probability when there is no traffic during vulnerable period is 𝑃𝑜 = 𝑒 −𝐺 .
Throughput per frame time (S) = 𝐺𝑃𝑜 , i.e 𝑆 = 𝐺𝑒 −𝐺 . The maximum throughput occurs
at G=1 i.e S = 0.368 (37%).
In non-persistent CSMA the station does not continuously sense the channel for the
purpose of capturing it when it detects the end of previous transmission.
It reduces the chance of collision because the stations wait a random amount of time. It
is very rare that two or more stations will wait for same amount of time and will
retransmit at the same time.
p – persistent CSMA:
In this method, the transmission of the frames will be done in the time slots. Whenever
a station is ready to send the frame, it senses the channel. If channel is busy, station waits
for the next slot. If channel is idle, it transmits with a probability p. With the probability
q = l-p, the station then waits for the next time slot. If the next slot is also idle, it either
transmits or waits again with probabilities p and q. This process is repeated till all the
frames has been transmitted or another station has begun transmitting. It reduces the
chance of collision and improves the efficiency of the network.
46
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
FDMA (Frequency Division Multiple Access):
In this method the available bandwidth is divided into equal frequency bands so that
each station can transmit its data on a different frequency. This frequency band belongs
to the station all the time. It is an access method in the data link layer. In this method the
data link layer in each station tells its physical layer to make a bandpass signal from the
data passed to it. The signal must be created in the allocated band.
• If the code of a station is multiplied by the code of the same station then the result
should be equal to the number of stations.
If any station has data bit 0 to be transmitted then it is considered as -1, and if the data
to transmitted is bit 1 then it is considered as +1 and if the station doesn’t want to
transmit any data then it is considered as 0.
Now each station multiplies its data (either -1, +1 or 0) with its station code. Then the
data to be transmitted in the channel by all the stations will be the sum of the
multiplication of data and code.
At the receiving end the data received will be multiplied by the sender’s station code Ci
and the result is divided by the numbers present in the code (Ex: code C1 has 4 numbers in its
code). Now if the result is +1 then the receiving station considers the data to be 1 and if
the result is -1 then the receiving station considers the data to be 0.
4. Write the comparison between random access and scheduling access control.
48
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
time which avoids the collision of
2) Random Access Control has two messages on the shared medium.
features: 2) Scheduling Access Control has two
• There is no fixed time for features:
sending data. • There is fixed time for sending
• There is no fixed sequence of data.
stations sending data. • There is fixed sequence of
3) Any station can send data if the stations sending data.
channel is idle. 3) Stations has to wait for their turn
even though the channel becomes
4) The different types of random- idle.
access control protocols are
4) The different types of Scheduling
ALOHA- pure and slotted, CSMA,
CSMA/CD, CSMA/CA. are- Reservation, Polling and
Token Passing.
ii) Routers:
49
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
It is a device which is used to connect two or more different class of Internet Protocol
(IP) networks. It operates in the network layer. It forwards data packets between the
computer networks. The data (like web pages or E-mail) transmitted through the internet is
in the form of packets, and these packets are forwarded from one router to the other
router until they reach the destination. When the data comes to one of the router it
reads the final destination’s address in the packet and then using the information in
its routing table, the router directs the packet to the next network. The advantage of
router is to connect two different class of IP address in the network and it choses best
path to forward the packets in the network.
iii) Hub:
It is a hardware device which sends data packets (or frames) to all the devices on the
network without considering MAC address. It doesn’t keep record of MAC addresses
of the devices connected to it. The frames arriving from one of the stations are sent to
all other stations connected to the hub.
iv) Switches:
It is a device that connects other devices on a network by using packet switching to
receive and forward data to the destination device which operates in the data link
layer. Switches keeps record of all the MAC addresses of the all the devices connected
to it, thus it knows which device or system is connected to which port. When a data
is received the switch immediately knows to which port the data has to be sent, so it
directs the data towards that MAC address.
Transparent bridges perform only the function of blocking or forwarding data based
on the MAC address. In transparent bridges, if a bridge is added or deleted from the
system then the reconfiguration of station is not needed. Transparent bridges must
meet the following criteria,
• Frames must be forwarded from one station to another.
50
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
• The forwarding table is automatically made by learning frame movements in
the network.
• Loops in the system must be prevented.
7. Explain FDDI.
Fiber distributed data interface (FDDI): It is an interface where optical fiber is used
for long distance communication. The fiber optic cables are laid up to 200 kilometers
at a speed of 100 megabit per second (Mbps). FDDI has dual communication rings
called as primary and secondary communication rings.
The primary ring is used to transmit the optical data in the network and the secondary
ring remains idle and works as a backup, i.e in case the primary ring fails then the
data can be transmitted through the secondary. Around 1000 stations can be
connected in FDDI. If primary ring transmits the data towards right of the node then
the secondary ring will transmit the data towards the left of the node. FDDI works
on the token ring protocol.
51
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
(In FDDI there will be two types of stations – DAS (Dual Attachment Station or Class A stations) and
SAS (Single Attachment Station or Class B Stations). A DAS will be connected to both the rings and
SAS will be connected to only primary ring.)
FDDI uses token passing as an access method. Any station which wants to transmits
information holds the token and then transmits the information. When the station
finishes the transmission then it releases the token in the ring. The time a station
holds the token is called Synchronous Allocation Time (SAT) and this time is
variable for each station. The allocation of this time to each station is allocated by
the Station Management (SMT). The function of SMT are ring control, ring
initialization, station insertion and station removal in the ring.
FDDI frame format:
Preamble: It gives a unique sequence that prepares each station for an upcoming
frame.
Start Delimiter: It indicates the beginning of a frame.
Frame control: It indicates the size of the address fields and whether the frame
contains asynchronous or synchronous data.
Destination Address: It contains a unicast (Single), multicast (group), or broadcast (all
stations in the network) address.
Source Address: It identifies the single station that has sent the frame.
Data: It contains either information destined for an upper layer protocol or control
information.
Frame Check Sequence (FCS): It contains the source station address with CRC
(Cyclic Redundancy Check) value. The destination address recalculates the value to
determine whether the frame was damaged in the channel. If so, the frame will be
discarded.
End Delimiter: It contains unique symbols which indicate the end of the frame.
Frame status: It allows the source station to determine whether an error has
occurred or not.
52
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
8. Write short notes on LAN standards.
The IEEE LAN standards comprises of networking standards which covers the
physical layer specifications from ethernet to wireless. The 802 represents the basics
of physical and logical networking concepts. The services and protocols specified in
IEEE 802 is related to the lower two layers of the OSI reference model, i.e. Data
Link and Physical. The IEEE 802 splits the Data Link Layer into two sub-
layers, Logical Link Control (LLC) and Medium Access Control (MAC) Data link
layer. The most widely used standards are for the Ethernet, Token Ring, Wireless
LAN (Wi-Fi), Bridging and Virtual Bridged LANs. The groups are numbered from
802.1 to 802.22. The important standards are
IEEE 802.1 – It handles the architecture, security, management and internetworking
of local area networks (LAN), metropolitan area networks (MAN) and wide area
networks (WAN).
IEEE 802.2 – It is a standard which defines logical link control (LLC) as the upper
portion of the data link layer of the OSI Model. LLC is a software component that
provides a uniform interface to the user of the data link service. LLC offer three
types of services: Unacknowledged connectionless services, Acknowledged
Connection services, Acknowledged connectionless services.
IEEE 802.3 – It is a standard which defines physical layer and the MAC sub-layer
of the data link layer for wired Ethernet networks.
IEEE 802.4 – It is a standard which acts as a communication protocol in a local area
network where all stations are connected in a bus topology and the token is passed
from one user to other in a sequence (left or right direction).
IEEE 802.5 – It is a standard which acts as a communication protocol in a local area
network (LAN) where all stations are connected in a ring topology and pass one or
more tokens for acquiring the channel in clockwise or anticlockwise direction.
IEEE 802.6 – It is a standard which is a DQDB (Distributed Queue Dual Bus) and
is a Metropolitan Area Network (MAN) protocol.
IEEE 802.11 – It is a standard which is used for implementing Wireless Local Area
Network (WLAN) in various frequencies. It provides functionality to MAC layer.
9. Explain CSMA / CD technique.
53
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
CSMA / CD (Carrier Sense Multiple Access with Collision Detection: If two or more
stations senses the channel to be idle and begin transmitting simultaneously, then the
stations will detect the collision almost immediately. Rather than continuing the
transmission of the frames the stations will stop the transmitting of the frames as
soon as the collision is detected. The protocol which does this process is known as
CSMA/CD.
In CSMA/CD once a station detects a collision, it aborts its transmission, waits a
random period of time and then tries again, assuming that no other station has started
transmitting in the meantime.
There are three states in CSMA/CD – Contention, Transmission and Idle period.
Contention Period: If the station determines that the channel is free, they wait a
random amount of time before they start sending. This duration is known as
contention period (or contention window).
Transmission Period: It is a period where the stations transmit the frames.
Idle period: It is a period where none of the station will be transmitting the frames.
In CSMA/CD the stations follow the below process
• Check if the sender is ready for transmitting the data packets.
• Check if the transmission link is idle, i.e. the sender has to keep on checking
if the transmission medium is idle.
• Transmit the data & check for collisions i.e. the sender transmits its data on
the channel. During transmission, if collision signal is received by the node,
transmission is stopped. The station then transmits a jam signal onto the
channel and waits for random amount of time before it resends the frame.
• If no collision was detected then the sender completes its frame transmission
and resets the counters.
54
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
10. Explain scheduling access control – reservation, polling and token passing.
Reservation:
• In the reservation method, a station has to make a reservation for using the channel
before sending data.
• If there are M stations, the reservation interval is divided into M slots and each
station has one slot.
• Suppose if station 1 has a frame to send then it transmits 1 bit during its slot No.1
and no other station is allowed to transmit during this slot.
• After all M slots have been checked, each station will come to know which stations
are wishing to transmit the data.
• The stations which have reserved their slots will transfer their frames in that order.
• After data transmission period, next reservation interval will begin.
• Since everyone agrees on who goes next, there will never be any collisions.
Example: Let there be five stations and then there will be five slot reservation
frames. In the first interval let only stations 1, 3, and 4 have made reservations, then
these will transmit the frames, and in the second interval let only station 1 has made
the reservation.
Polling
55
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
• It is a technique that identifies when a terminal (station) is ready to send the data. In
this technique one station will act as a controller, which will periodically check all
the stations whether they have any data to transmit is called polling.
• In this method one station acts as a primary controller) and the others acts as
secondary stations.
• Whenever a secondary station has some data to transmit it must be sent to the
controller.
• Then the controller sends a message to each node (Station).
• The message sent by the controller contains the address of the node being selected
for granting the access and the message sent by the controller will be received by all
the nodes but only the station with the address will respond to it and sends the data,
and if there is no data to be transmitted then the station will send “poll reject”(NAK)
message is sent back.
Token Passing
• In token passing scheme, the stations are connected logically to each other in the
form of ring and access of the stations is by means of tokens.
• A token is a special bit pattern or a small message, which circulates from one station
to the other in the some predefined (Ex: priority) order.
(In Token ring, token is passed from one station to another adjacent station in the ring and in Token bus,
token is passed from one station to another station in some predefined order.)
56
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
• A station can only transmit the frames if it receives the token and after the
transmission of data the token is passed to the next station.
• After sending a frame, each station must wait for all N stations (including itself) to
send the token to their neighbors.
IEEE 802.2 is a standard which defines logical link control (LLC) as the upper portion
of the data link layer of the OSI Model. LLC is a software component that provides a
uniform interface to the user of the data link service. LLC may offer three types of
services:
• Unacknowledged connectionless services,
• Acknowledged connectionless services.
• Acknowledged Connection Oriented services,
It acts as the interface between the network layer and the medium access control (MAC)
sublayer of the data link layer. The LLC sublayer is used for its multiplexing property.
Functions of LLC Sublayer
• The primary function of LLC is to multiplex protocols over the MAC layer while
transmitting and likewise to de-multiplex the protocols while receiving.
57
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
802.2 LLC Frame format:
LLC Header
Information
DSAP address SSAP address Control
o Control – It is an 8-bit or 16-bit field which represents the Protocol Data Units
for connectionless or connection-oriented applications
• Information: It contains the data to be transmitted from the source station to the
destination, whereas the size of each frame has to be in the multiples of 8-bits.
IEEE 802.3 is a standard which defines physical layer and the MAC sub-layer of the
data link layer for wired Ethernet networks.
• PREAMBLE (PRE) – It contains 1-Byte which indicates starting of the frame and
allow sender and receiver to establish bit synchronization.
59
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
• Start of frame delimiter (SFD) – This is a 1-Byte field which is always set to
10101011. SFD indicates that upcoming bits are starting of the frame, which is the
destination address. It is sometimes considered as the part of PRE. The SFD tells the
other stations that this is the last chance for synchronization.
• Frame Control – This is a 1-byte field which specifies the type of frame i.e whether
it is a data frame (represents that the frame contains data) or a control frame (represents frame types
like frame’s priority, token passing and various ring maintenance frames).
• Destination Address – It is a 2 to 6-Bytes field which contains the MAC address of
the destination station which receives the data.
• Source Address – It is a 2 to 6-Bytes field which contains the MAC address of the
source station from which the data has to be transmitted. As Source Address is always
an individual address, the least significant bit of first byte is always 0.
• Data – This is the place where actual data is inserted and is known as Payload. Both
IP header and data will be inserted here if Internet Protocol is used over Ethernet.
• Checksum – Checksum is 4 Byte field. This field contains a 32-bits hash code of data.
If the checksum computed by destination is not the same as sent checksum value then
the data received at the destination will be considered as corrupted.
• End Delimiter – It is 1Byte field. It represents the end of the frame.
60
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
Preamble: It gives a unique sequence that prepares each station for an upcoming
frame.
Start Delimiter: It indicates the beginning of a frame.
Frame control: It indicates the size of the address fields and whether the frame
contains asynchronous or synchronous data.
Destination Address: It contains a unicast (Single), multicast (group), or broadcast (all
stations in the network) address.
Source Address: It identifies the single station that has sent the frame.
Data: It contains either information destined for an upper layer protocol or control
information.
Frame Check Sequence (FCS): It contains the source station address with CRC
(Cyclic Redundancy Check) value. The destination address recalculates the value to
determine whether the frame was damaged in the channel. If so, the frame will be
discarded.
End Delimiter: It contains unique symbols which indicate the end of the frame.
Frame status: It allows the source station to determine whether an error has
occurred or not.
The Token in IEEE 802.5 contains preamble, start delimiter, frame control, end
delimiter which will be rotating in the channel, the station which has data to be
transmitted will acquire this token and will fill these details in it.
IEEE 802.11 is a standard which provides functionality to MAC layer and it is used for
implementing Wireless Local Area Network (WLAN) in various frequencies. IEEE
802.11 frame contains 9 fields.
61
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
• Frame Control(FC) –
It is 2 bytes long field which contains type of frame and some control information.
Various fields present in FC are:
1. Version:
It is a 2 bit long field which indicates the current protocol version which is
fixed for any version.
2. Type:
It is a 2 bit long field which determines the function of frame i.e
management(00), control(01) or data(10). The value 11 is reserved.
3. Subtype:
It is a 4 bit long field which indicates sub-type of the frame like 0000 for
association request, 1000 for beacon (ideal).
4. To DS:
It is a 1 bit long field which when set (bit is 1) indicates that destination frame is
for DS(distribution system).
5. From DS:
It is a 1 bit long field which when set indicates frame is coming from DS.
6. More frag (More fragments):
It is 1 bit long field which when set indicates frame is followed by other
fragments.
7. Retry:
It is 1 bit long field which when set indicates that the current frame is a
retransmission of an earlier frame.
8. Power Mgmt (Power management):
It is 1 bit long field which indicates the mode of a station after successful
transmission of a frame. If this bit is Set to 1 then it indicates that the station
goes into power-save mode and if the bit is set to 0 then it indicates that the
station stays active.
9. More data:
It is 1 bit long field which indicates to the receiver that the sender has more data
to send than the current frame. This can be used by an access point to indicate
62
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
to a station which is in power-save mode that more packets are buffered or has
more data ready to transmit.
10.WEP (Wired Equivalent Privacy):
It is 1 bit long field which when set indicates that the frame is an encrypted
frame. This indicates that the security provided to a WLAN (wireless LAN) is
similar to that of a wired LAN.
11.Order:
It is 1 bit long field which indicates that if this bit is set to 1 then it informs the
receiver that to the higher layers (Ex.: OSI layers) that the frames should be in an
ordered sequence.
• Duration/ID –
It is 2 bytes long field which specifies the time period for which the frame and its
acknowledgement occupy the channel.
• Address 1 to 4 –
These are 6 bytes long fields which contains standard IEEE 802 MAC addresses (48
bit each). The meaning of each address depends on the DS bits in the frame control
field. Address 1 indicates address of source, Address 2 indicates source address of
base station (intermediate stations through which the data will pass), address 3
indicates destination address of base station, address 4 indicates the address of final
endpoint.
• SC (Sequence control) –
It a 2 bytes field that stores the frame numbers. It detects the duplicate frames and
determines the order of frames for higher layers. Among the 16 bits, the first 4 bits
provides identification to the fragment and the rest 12 bits contain the sequence
number that increments with each transmission.
• Data –
It is a variable field that carries the payload from the upper layers. The maximum
size of data field is 2312 bytes.
• CRC (Cyclic redundancy check) or checksum–
It is 4 bytes long field which contains a 32 bit CRC error detection sequence to
ensure error free frame.
63
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
16. Explain polling and token passing ring concepts.
Polling
• It is a technique that identifies when a terminal (station) is ready to send the data. In
this technique one station will act as a controller, which will periodically check all
the stations whether they have any data to transmit is called polling.
• In this method one station acts as a primary controller) and the others acts as
secondary stations.
• Whenever a secondary station has some data to transmit it must be sent to the
controller.
• Then the controller sends a message to each node (Station).
• The message sent by the controller contains the address of the node being selected
for granting the access and the message sent by the controller will be received by all
the nodes but only the station with the address will respond to it and sends the data,
and if there is no data to be transmitted then the station will send “poll reject”(NAK)
message is sent back.
Token Passing
• In token passing scheme, the stations are connected logically to each other in the
form of ring and access of the stations is by means of tokens.
• A token is a special bit pattern or a small message, which circulates from one station
to the other in the some predefined (Ex: priority) order.
64
Prof. N. H. Patil
B.Com IV SEMESTER BUSINESS COMMUNICATION & NETWORKING
(In Token ring, token is passed from one station to another adjacent station in the ring and in Token bus,
token is passed from one station to another station in some predefined order.)
• A station can only transmit the frames if it receives the token and after the
transmission of data the token is passed to the next station.
• After sending a frame, each station must wait for all N stations (including itself) to
send the token to their neighbors.
Each bus is connected to the stations directly through input and output ports. Beginning
of bus is denoted by square and end is denoted by triangle. To transmit the data by a
station it must know whether the destination is to its right or left. If right, the host must
send on the left bus and if left, the host must send on the right bus. Here Bus A traffic
moves from right to left and Bus B traffic moves from left to right.
65
Prof. N. H. Patil