SlideShare a Scribd company logo
1 of 38
Download to read offline
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 1
UNIT - 1- NETWORK MODELS
Learning Objectives:
Upon completion of this unit, the student should be able to:
 Understand the need for computer communication networks.
 Be familiar with the OSI and TCP/IP models.
 Understand the responsibilities of each layer in OSI and TCP/IP models.
 Discuss the types of addresses are used in TCP/IP protocols.
 Understand telephone and cable networks used for data transmission.
 Discuss the Signaling System Seven (SS7) used in networks.
 Explains the different services offered by Telephone Networks.
 Explains the Digital Subscriber Line (DSL) and its versions for ISDN services.
 Discuss the most popular modems are available for data transmission.
1. Introduction :
Data communications and networking are changing the way we live. Computer Communication
Network (CCN) deals with four major concepts. They are
1. Data communications
2. Networking
3. Protocols and standards and
4. Networking models.
Networks exist so that data may be sent from one place to another-the basic concept of data
communications. Data communications between remote parties can be achieved through a
process called networking. Protocols and standards are vital to the implementation of data
communications and networking. Protocols refer to the set of rules and regulations; a standard
is a protocol that has been adopted by vendors and manufacturers. Network models serve to
organize, unify, and control the hardware and software components of data communications
and networking.
A network is a combination of hardware and software that sends data from one location to
another. The hardware consists of the physical equipment that carries signals from one point of
the network to another. The software consists of instruction sets that make possible the services
that we expect from a network. Computer networks are very complex object; hence it is
partitioned in to vertical set of levels, each level called layer.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 2
1.1 Layered tasks: We use the concept of layers in our daily life. As an example, let us consider
two friends who communicate through postal mail. The process of sending a letter to a friend
would be complex if there were no services available from the post office. Figure 1.1 shows the
tasks involved in sending a letter
Figure 1.1 Tasks involved in sending a letter
The task includes a sender, a receiver, and a carrier that transports the letter. There is a
hierarchy of tasks. Higher Layer, Middle Layer and Lower Layer. Each layer performs specific
tasks and uses the services of the layer immediately below it.
1.2 The OSI Model: ***
 It is a 7 layers model.
 It is an Open Systems Interconnection model.
 It was first introduced in the late 1970s.
 OSI developed by International Standards Organization (ISO).
The purpose of the OSI model:
 To show how to facilitate communication between different systems without requiring
changes to the logic of the underlying hardware and software.
 The OSI model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust, and interoperable.
 The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 3
Layered Architecture: The OSI model is composed of seven layers:
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer and
7. Application Layer
The structure of seven layers in OSI model as shows figure 1.2
Figure 1.2 Seven layers of the OSI model
Layers are designed to identify which networking functions had related uses and collected those
functions into discrete groups that became the layers. The OSI model allows complete
interoperability between networks. The Each layer uses the services of the layer immediately
below it.
Peer-to-Peer Processes: Layer x on one machine communicates with layer x on another machine
called Peer-to-Peer Processes. This communication is governed by an agreed-upon series of rules
and conventions called protocols. Communication between machines is therefore a peer-to-peer
process using the protocols appropriate to a given layer, which is shown in figure 1.3.
Interfaces between Layers: Each interface defines what information and services a layer must
provide for the layer above it. Well defined interfaces and layer functions provide modularity to
a network.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 4
Figure 1.3 The interaction between layers in the OSI model
Organizations of the layers: The seven layers can be thought of as belonging to three subgroups.
It allows interoperability among unrelated software systems
1. Network support layers : Physical (layer1), Data link (layer2), Network (layer3).
2. User support layers : Session (layer5), Presentation (layer6),Application (layer7)
3. Transport layer (Layer 4) : Links the above two layers subgroups
Data flow mechanism in OSI model: The figure 1.4 gives an overall view of the OSI layers.
Figure 1.4 An exchange using the OSI model
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 5
Data flow: D7 means the data unit at layer 7, D6 means the data unit at layer 6, and so on. The
process starts at layer 7 then moves from layer to layer in descending, sequential order. At each
layer, a header, or possibly a trailer, can be added to the data unit. Commonly, the trailer is
added only at layer 2. When the formatted data unit passes through the physical layer (layer 1),
it is changed into an electromagnetic signal and transported along a physical link. The reverse
process occurs in the receiver side and the message is again in a form appropriate to the
application and is made available to the recipient.
The data portion of a packet at level N-1 carries the whole packet from level N. The concept is
called “encapsulation”.
1.3 Layers in the OSI Model: This section briefly describes the functions of each layer in the
OSI model.
1. Physical Layer: It layer coordinates the functions required to transmit a bit stream over a
physical medium. It is responsible for movements of individual bits from one hop (node) to the
next. It deals with the mechanical and electrical specification of the primary connections like
cable, connectors etc.
Figure 1.5 Physical layer
Physical layer is concerned with the following:
• Physical characteristics of interfaces and medium: Types of medium and interfaces.
• Representation of bits: 1’s or 0’s Encoded in to Electrical or optical.
• Data rate: transmission rate: Speed in bps.
• Synchronization of bits: Both Transmitter and Receiver are in the same clock.
• Line configuration: Point to Point or Multipoint transmission.
• Physical topology: Way in which the network formed, ring bus, etc.
• Transmission mode: Simplex, Half or Full Duplex.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 6
2. Data Link Layer: The data link layer is responsible for moving frames from one hop (node) to
the next hop.
Figure 1.6 Data link layer
Major duties of Data Link Layer:
 Framing
 Physical addressing
 Flow control
 Error control
 Access control
Figure 1.7 illustrates hop-to-hop (node-to-node) delivery by the data link layer
Figure 1.7 Hop-to-Hop deliveries
As the figure 1.7 shows, communication at the DLL occurs between two adjacent nodes. To send
data from A to F, three partial deliveries are made. First, the DLL at A sends a frame to the DLL at
B (a router). Second, the data link layer at B sends a new frame to the data link layer at E. Finally,
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 7
the DLL at E sends a new frame to the DLL at F. Note that the frames that are exchanged
between the three nodes have different values in the headers. The frame from A to B has B as
the destination address and A as the source address. The frame from B to E has E as the
destination address and B as the source address. The frame from E to F has F as the destination
address and E as the source address.
3. Network Layer: It is responsible for the delivery of individual packets from the source host to
the destination host. Other responsibilities of network layer includes
 Logical addressing
 Routing
Figure 1.8 Network layer
Figure 1.9 illustrates end-to-end delivery by the network layer.
Figure 1.9 Source-to-destination delivery
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 8
4. Transport Layer: It is responsible for the delivery of a message from one process to another. A
process is an application program running on a host. It ensures that the whole message arrives
intact and in order, overseeing both error control and flow control at the source-to-destination
level.
Figure1.10 shows the relationship of the transport layer to the network and session layers.
Figure 1.10 Transport layer
Other responsibility of the transport layer includes the following:
1. Service-point addressing.
2. Segmentation and reassembly.
3. Connection control.
4. Flow control.
5. Error control.
Figure 1.11 Illustrates process-to-process delivery by the transport layer.
Figure 1.11 Reliable process-to-process delivery of a message
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 9
5. Session Layer: The session layer is responsible for dialog control and synchronization. Specific
responsibilities of the session layer include the following:
1 .Dialog control: The session layer allows two systems to enter into a dialog. It allows the
communication between two processes to take place in either half-duplex full-duplex mode.
2. Synchronization: The session layer allows a process to add checkpoints, or synchronization
points, to a stream of data
Figure 1.12 Session layer
6. Presentation Layer: The presentation layer is concerned with the syntax and semantics of the
information exchanged between two systems. Figure 1.13 shows the relationship between the
presentation layer and the application and session layers
Figure 1.13 Presentation layer
Specific responsibilities of the presentation layer are
1. Translation: Different computers use different encoding systems, the presentation layer is
responsible for interoperability between these different encoding methods. The presentation
layer at the sender changes the information from its sender-dependent format into a common
format. The presentation layer at the receiving machine changes the common format into its
receiver-dependent format.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 10
2. Encryption: It ensures privacy for carry sensitive information by sending the information in
other form.
3. Compression: Data compression reduces the number of bits contained in the information. It
becomes particularly important in the transmission of multimedia such as text, audio, and video.
7. Application Layer: The application layer is responsible for providing services to the user.
Figure 1.14 Application layer
The major duties of the application:
 Network virtual terminal: Enable to user for remote login
 File transfer, access, and management
 Mail services
 Directory services
Summary of Layers :
Figure 1.15 Summary of layers
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 11
1.4 TCP / IP PROTOCOL SUITE (Transmission Control Protocol / Internet Protocol)***
TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a
specific functionality. TCP/IP protocol suite was defined as having four layers shown in fig 1.16
1. Host-To-Network.
2. Internet.
3. Transport and
4. Application.
Figure 1.16 TCP/IP and OSI model
In figure 1.16 TCP/IP is compared to OSI, Here host-to-network layer is equivalent to the
combination of the physical and data link layers. The internet layer is equivalent to the network
layer, and the application layer is roughly doing the job of the session, presentation, and
application layers with the transport layer in TCP/IP taking care of part of the duties of the
session layer.
TCP / IP PROTOCOL SUITE: It consists of four layers; they are
1. Host-To-Network
2. Internet,
3. Transport and
4. Application layers. This is shown in figure 1.17.
TCP / IP PROTOCOL layers description:
1. Host-to-network layer: In this layer TCP/IP does not define any specific protocol. It supports
all the standard and proprietary protocols. A network in a TCP/IP internetwork can be a local
area network (LAN) or a wide-area network (WAN).
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 12
Figure 1.17 TCP/IP and OSI model
2. Network Layer (IP layer): TCP/IP supports the Internetworking Protocol. IP uses four
supporting protocols: ARP, RARP, ICMP, and IGMP.
1. ARP (Address Resolution Protocol)
2. RARP (Reverse Address Resolution Protocol)
3. ICMP (Internet Control Message Protocol)
4. IGMP (Internet Group Message Protocol)
1. Internetworking Protocol (IP): It is an unreliable and connectionless protocol-a best-effort
delivery service. IP transports data in packets called datagram, each of which is transported
separately. Datagram’s can travel along different routes and can arrive out of sequence or
be duplicated. IP does not keep track of the routes and has no facility for reordering
datagram once they arrive at their destination.
2. Address Resolution Protocol (ARP): It is used to associate a logical address with a physical
address. ARP is used to find the physical address of the node when its Internet address is
known.
3. Reverse Address Resolution Protocol (RARP): It allows a host to discover its Internet address
when it knows only its physical address. It is used when a computer is connected to a
network for the first time or when a diskless computer is booted.
4. Internet Control Message Protocol (ICMP): It is a mechanism used by hosts and gateways to
send notification of datagram problems back to the sender. ICMP sends query and error
reporting messages.
5. Internet Group Message Protocol (IGMP): The Internet Group Message Protocol (IGMP) is
used to facilitate the simultaneous transmission of a message to a group of recipients.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 13
3. Transport Layer: This layer was represented in TCP/IP by two protocols, TCP and UDP. These
protocols are responsible for delivery of a message from a process to another process.
a. UDP (User Datagram Protocol): It is a process-to-process protocol that adds only port
addresses, checksum error control, and length information to the data from the upper layer.
b. TCP (Transmission Control Protocol): It provides full transport-layer services to applications. It
is a reliable stream transport protocol. It gives connection-oriented: A connection must be
established between both ends services.
c. SCTP (Stream Control Transmission Protocol): It provides support for newer applications such
as voice over the Internet. It is a transport layer protocol that combines the best features of
UDP and TCP.
5.Application Layer: It support user interface with network. many protocols are defined at this
layer are:
 HTTP(Hypertext Transfer Protocol):enables the connection between a web server
and a client
 SMTP(Simple Mail Transfer Protocol): An electronic mail (e-mail) allows users to
send mails across an internet.
 c FTP(File Transfer Protocol): Enables user to transfer the data file
 DNS(Domain Naming System): client to remote login
 TELNET : Tele communication protocol, VoIP
6. Comparison between OSI and TCP/IP Model
OSI Model TCP/IP MODEL
It is a 7 layers model It is a 4 layers model
Protocols are more hidden Protocols are less hidden
Model comes first and next protocol Protocol comes first and next Model
Each layer having less specific functionality Each layer having more specific
functionality
Supports both connection and connectionless
oriented services in network layer
It mainly supports connection less
services in network layer
Only connection oriented services in transport
layer
Both connection and connectionless
oriented services in transport layers
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 14
1.5 ADDRESSING***
Four levels of addresses are used in an internet employing the TCP/IP protocols:
1. Physical addresses
2. Logical addresses
3. Port addresses, and
4. Specific addresses
Figure1.17 Addresses in TCP/IP
1. Physical Addresses: It also known as the link address, is the address of a node as defined by
its LAN or WAN. It is included in the frame used by the data link layer. The physical addresses
have authority over the network (LAN or WAN).The size and format of these addresses vary
depending on the network.
Example 1.1: In Figure 1.19 a node with physical address 10 sends a frame to a node with
physical address 87. The two nodes are connected by a link. As the figure shows, the computer
with physical address 10 is the sender, and the computer with physical address 87 is the
receiver.
Figure 1.19 Physical addresses
Example 1.2: Most local-area networks use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 15
2. Logical Addresses: Logical addresses are necessary for universal communications that are
independent of underlying physical networks. Physical addresses are not adequate in an
internetwork environment where different networks can have different address formats. A
universal addressing system is needed in which host can be identified uniquely, regardless of the
underlying physical network.
Example 1.3: Figure 1.20 shows a part of an internet with two routers connecting three LANs.
Each device has a pair of addresses (logical and physical) for each connection. In this case, each
computer is connected to only one link and therefore has only one pair of addresses. Each
router, however, is connected to three networks (only two are shown in the figure). So each
router has three pairs of addresses, one for each connection. The physical addresses will change
from hop to hop, but the logical addresses usually remain the same.
Figure 1.20 IP addresses
3. Port Addresses: The IP and the physical address are necessary for a quantity of data to travel
from a source to the destination host. The end object of Internet communication is a process
communicating with another process. For these processes to receive data simultaneously, we
need a method to label assigned to a process is called a port address. A port address in TCP/IP is
16 bits in length. The physical addresses will change from hop to hop, but the logical and port
addresses usually remain the same.
Example 1.4: Figure 1.21. Shows two computers communicating via the Internet. The sending
computer is running three processes at this time with port addresses a, b, and c. The receiving
computer is running two processes at this time with port addresses j and k. Process a in the
sending computer needs to communicate with process j in the receiving computer. Note that
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 16
although physical addresses change from hop to hop, logical and port addresses remain the
same from the source to destination.
Figure 1.21 Port addresses
Example 1.5: Port address is a 16-bit address represented by one decimal number as shown.
753
A 16-bit port address represented as one single number
4. Specific Addresses: Some applications have user-friendly addresses that are designed for that
specific address.
 E-mail address
 URL (Universal Resource Locator)
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 17
1.6 TELEPHONE NETWORK:
1. Introduction: It is beginnings in the late 1800s.Originally an analog system using analog
signals to transmit voice. The entire network, which is referred to as the plain old telephone
system (POTS).Telephone networks use circuit switching.
Telephone System:
Figure 1.22 Telephone system
Major components of Telephone System:
1. Local Loops: A twisted-pair cable that connects the subscriber telephone to the nearest end
office or local central office. Its B.W is 4 kHz for voice communication. The first three digits of a
local telephone number define the office, and the next four digits define the local loop number.
2. Trunks: Trunks are transmission media that handle the communication between offices. Trunk
normally handles hundreds or thousands of connections through multiplexing. transmission is
usually through optical fibers or satellite links.
3. Switching Offices: To avoid having a permanent physical link between any two subscribers,
the telephone company has switches located in a switching office. Switch connects several local
loops or trunks and allows a connection between different subscribers
2. Local-Access Transport Areas (LATAs): A LATA can be a small or large metropolitan area. A
small state may have one single LATA; a large state may have several LATAs. A LATA boundary
may overlap the boundary of a state; part of a LATA can be in one state, part in another state.
Two types of LATAs Services
a) Intra-LATA Services
b) Inter-LATA Services
a) Intra-LATA Services: The services offered by the common carriers (telephone companies)
inside a LATA are called intra-LATA services.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 18
Figure 1.23 Switching offices in a LATA
The carrier that handles these services is called a local exchange carrier (LEC). Before the
Telecommunications Act of 1996 intra-LATA services were granted to one single carrier. This was
a monopoly. After 1996, more than one carrier could provide services inside a LATA. The carrier
that provided services before 1996 owns the cabling system (local loops) and is called the
Incumbent Local Exchange Carrier (ILEC).The new carriers that can provide services are called
Competitive Local Exchange Carriers (CLECs). CLECs would provide other services such as mobile
telephone service, toll calls inside a LATA, and so on. Communication inside a LATA is handled by
end switches and tandem switches. A call that can be completed by using only end offices is
considered toll-free. A call that has to go through a tandem office (intra-LATA toll office) is
charged.
b). Inter-LATA Services: The services between LATAs called Inter-LATA Services.
Figure 1.24 Point of Presences (POPs)
These services handled by Interexchange Carriers (IXCs).IXCs sometimes called long-distance
companies, provide communication services between two customers in different LATAs. Major
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 19
companies providing inter-LATA services include AT&TMCI, WorldCom, Sprint, Verizon etc. The
IXCs are long-distance carriers that provide general data communications services including
telephone service. A telephone call going through an IXC is normally digitized, with the carriers
using several types of networks to provide service. Each IXC that wants to provide inter LATA
services .in a LATA must have a POP in that LATA. The LECs that provide services inside the LATA
must provide connections so that every subscriber can have access to all POPs. Points of
Presence (POP): Point of presence (POP) connects several LECs and IXCs.
3. Signaling: It is used for information exchange concerning the establishment and control of a
telecommunication circuit & the management of the network, in contrast to user information
transfer. The signaling system was required to perform other tasks such as
 Providing dial tone, ring tone, and busy tone.
 Transferring telephone numbers between offices.
 Maintaining and monitoring the call.
 Keeping billing information.
 Maintaining and monitoring the status of the telephone network equipment.
 Providing other functions such as caller ID, voice mail, and so on.
 In modern telephone networks the tasks of data transfer and signaling are separated:
Data transfer is done by one network, signaling by another, which is shown in figure 1.25
Figure1.25 Data transfer and signaling networks
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 20
4. Signaling System Seven (SS7) ***
SS7 is a global standard for telecommunications defined by the ITU. The protocol that is used in
the signaling network is called Signaling System Seven (SS7).The standard defines the procedures
and protocol by which network elements in PSTN exchange information over a digital signaling
network to effect wireless (cellular) and wire line call setup, routing and control. The SS7
network and protocol are used for:
 Basic call setup, management and tear down.
 Wireless services such as personal communications services (PCS), wireless roaming, and
mobile subscriber authentication.
 Local Number Portability (LNP).
 Toll-free (800/888) and toll (900) wireline services.
 Enhanced call features such as call forwarding, calling party name/number display, and
three-way calling.
 Efficient and secure worldwide telecommunications.
Layers of SS7: It is very similar to the five-layer Internet model, but the layers have different
names as shown 1.26
Figure 1.26 Layers in SS7
1. Physical Layer: MTP Level 1 The physical layer in SS7 called message transport part (MTP)
level I uses several physical layer specifications such as T-l (1.544 Mbps) and DCa (64 kbps).
2. Data Link Layer: MTP Level 2 the MTP level 2 layers provides typical data link layer services
such as packetizing, using source and destination address in the packet header, and CRC for
error checking.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 21
3. Network Layer: MTP Level 3 The MTP level 3 layer provides end-to-end connectivity by using
the datagram approach to switching. Routers and switches route the signal packets from the
source to the destination.
4. Transport Layer: SCCP The signaling connection control point (SCCP) is used for special
services such as SaO-call processing.
5. Upper Layers: TUP, TCAP, and ISUP are three protocols at the upper layers.
a. Telephone user port (TUP) is responsible for setting up voice calls. It receives the dialed
digits and routes the calls.
b. Transaction capabilities application port (TCAP) provides remote calls that let an
application program on a computer invoke a procedure on another computer.
c. ISDN user port (ISUP) can replace TUP to provide services similar to those of an ISDN n/w
5. Services Provided by Telephone Networks: *** Telephone companies provide two types of
services: Analog and Digital.
1. Analog Services:
 Analog Switched Services
 800 service
 Wide-area telephone service (WATS).
 900 services
 Analog Leased Service
2. Digital Services:
 Switched/56 service.
 Digital data service (DDS).
6. Dial Up Modems:
Traditional telephone lines can carry frequencies between 300 and 3300 Hz of BW 3000 Hz. This
range is used for transmitting voice. The effective bandwidth of a telephone line being used for
data transmission is 2400 Hz, covering the range from 600 to 3000 Hz, shown in figure 1.27
Figure 1.27 Telephone line bandwidth
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 22
MODEM: It is a device: a signal modulator and a signal demodulator. A modulator creates a
band pass analog signal from binary data. A demodulator recovers the binary data from the
modulated signal.
.
Figure 1.28 Modulation/demodulation
7. Modem Standards ***
Most popular modems available are based on the V-series standards published by the ITU-T
V.32 modem:
 It uses a combined modulation and encoding technique called trellis-coded modulation.
 The V.32 calls for 32-QAM with a baud rate of 2400.
 Uses 4 bits of each symbol represent data; then total data rate is 4 x 2400 = 9600 bps.
V.32bis Modem:
 It was the first of the ITU-T standards to support 14,400-bps transmission.
 It uses 128-QAM transmission (7 bits/baud with I bit for error control) at a rate of 2400
baud (2400 x 6 = 14,400 bps.)
V.34bis Modem:
 It provides a bit rate of 28,800 with a 960-point constellation
 Bit rate of 33,600 bps with a 1664-point constellation
V.90 Modem
 V.90 modems with a bit rate of 56,000 bps. Also called 56K modems.
 These modems may be used only if one party is using digital signaling
 They are asymmetric in that the downloading rate is a maximum of 56 kbps, while the
uploading rate can be a maximum of 33.6 kbps.
V.92 Modem
 The standard above V90 is called V.92.
 These modems can adjust their speed, and if the noise allows, they can upload data at
the rate of 48 kbps. The downloading rate is still 56 kbps.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 23
 The modem has additional features. For example, the modem can interrupt the Internet
connection when there is an incoming call if the line has call-waiting service.
Figure 1.29 Uploading and downloading in 56K modems
1.7. DIGITAL SUBSCRIBER LINE (DSL) ***
It supports high- speed digital communication over the existing local loops. After traditional
modems reached their peak data rate, telephone companies developed another technology,
DSL, to provide higher-speed access to the Internet. DSL technology is a set of technologies, i.e
1. Asymmetric Digital Subscriber Line (ADSL)
2. Very High-bit-rate Digital Subscriber Line (VDSL)
3. High-bit-rate Digital Subscriber Line (HDSL)
4. Symmetric Digital Subscriber Line (SDSL).
1. ADSL (Asymmetric Digital Subscriber Line): It is like a 56K modem, provides higher speed in
the downstream direction than in the upstream direction. That is the reason it is called
‘asymmetric’. ADSL specifically divided the available bandwidth of the local loop unevenly for the
residential customer. The service is not suitable for business customers who need a large
bandwidth in both directions. But how does ADSL reach a data rate that was never achieved with
traditional modems?
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 24
The existing local loops can handle bandwidths up to 1.1 MHz the entire 1.1 MHz is available
for data and voice communications. ADSL is an adaptive technology. The system uses a data rate
based on the condition of the local loop line.
1.1 Discrete Multitone Technique (DMT): The modulation technique that has become standard
for ADSL is called the Discrete Multitone Technique (DMT) which combines QAM and FDM.
Figure 1.30 Discrete multitone technique
There is no set way that the bandwidth of a system is divided. Each system can decide on its
bandwidth division. Figure 1.31: Bandwidth division in ADSL
Figure 1.31: Bandwidth division in ADSL
Typically, an available bandwidth of 1.104 MHz is divided into 256 channels. Each channel uses a
bandwidth of 4.312 kHz. The fig 1.30 shows how bandwidth can be divided into the following:
 Voice: Channel 0 is reserved for voice communication.
 Idle: Channels 1 to 5 are not used and provide a gap between voice and data communication.
 Upstream data and control: Channels 6 to 30 (25 channels) are used for upstream data
transfer (24 channels) and 1 control. If there are 24 channels, each using 4 kHz (out of 4.312
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 25
kHz available) with QAM modulation. Upstream Data rate 24 x 4000 x 15, or a 1.44-Mbps.But
the data rate is normally below 500 kbps because some of the carriers are deleted at
frequencies where the noise level is large.
 Downstream data and control: Channels 31 to 255 (225 channels) are used for downstream
data transfer and control. One channel is for control, and 224 channels are for data. If there
are 224 channels, then the data rate up to 224 x 4000 x 15, or13.4 Mbps. But in practice data
rate is normally below 8 Mbps, due to high noise in the some channel.
1.2 ADSL Implementation: 1. Customer Site: ADSL Modem (down link)
ADSL modem is located in customer site, like home or office buildings. This is shown in
figure 1.32
Figure 1.32: ADSL modem
ADSL modem installed at a customer's site. The local loop connects to a splitter which
separates voice and data communications. The ADSL modem modulates and demodulates the
data, using DMT, and creates downstream and upstream channels.
1.3 Telephone Company Site: DSLAM (uplink):
Figure 1.33: DSLAM
At the telephone company site, Instead of an ADSL modem, a device called a digital subscriber
line access multiplexer (DSLAM) is installed; it packetizes the data to be sent to the Internet.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 26
1.4 ADSL Lite:
 It is a splitter less ADSL, since the installation of splitters at the border of the user
premises expensive and impractical.
 This technology allows an ASDL Lite modem to be plugged directly into a telephone jack
and connected to the computer.
 The splitting is done at the telephone company. It uses 256 DMT carriers with 8-bit
modulation.
 It can provide a maximum downstream data rate of 1.5 Mbps and an upstream data rate
of 512 kbps.
3. High-bit-rate Digital Subscriber Line (HDSL)
 It was designed as an alternative to the T-1 line.
 HDSL uses 2B1Q encoding which is less susceptible to attenuation.
 A data rate of 1.544 Mbps can be achieved without repeaters up to a distance of 12,000
ft (3.86 km).
 HDSL uses two twisted pairs (one pair for each direction) to achieve full-duplex
transmission.
4. Symmetric Digital Subscriber Line (SDSL).
 The symmetric digital subscriber line (SDSL) is a one twisted-pair version of HDSL.
 It provides full-duplex symmetric communication supporting up to 768 kbps in each
direction.
 Although this feature meets the needs of most residential subscribers, it is not suitable
for residential subscribers that send and receive data in large volumes in both directions.
Table below shows a summary of DSL technologies: Note: Two-binary, one-quaternary (2B1Q)
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 27
1.8 CABLE TV NETWORKS: The cable TV network started as a video service provider, but it
has moved to the business of Internet access. Two types
1. Traditional Cable Networks
2. Hybrid Fiber-Coaxial (HFC) Network
1. Traditional Cable Networks: It was called community antenna TV (CATV) because an antenna
at the top of a tall hill or building received the signals from the TV stations and distributed them,
via coaxial cables, to the community. Figure 1.34 shows a schematic diagram of a traditional
cable TV network. Communication in the traditional cable TV network is unidirectional
Figure 1.34 Traditional cable TV networks
2. Hybride Fibre-Coaxial (HFC) Network : It is a second generation of cable networks.
Figure 1.35 Hybrid fiber-coaxial (HFC) network
The network uses a combination of fiber-optic and coaxial cable. The transmission medium from
the cable TV office to a box, called the fiber node, is optical fiber; from the fiber node through
the neighborhood and into the house is still coaxial cable. Figure 1.35 shows a schematic
diagram of an HFC network. The Regional Cable Head (RCH) normally serves up to 400,000
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 28
subscribers. The RCHs feed the distribution hubs, each of which serves up to 40,000 subscribers.
Modulation and distribution of signals are done in the distribution hub; the signals are then fed
to the fiber nodes through fiber-optic cables. The fiber node splits the analog signals so that the
same signal is sent to each coaxial cable. Each coaxial cable serves up to 1000 subscribers. The
use of fiber-optic cable reduces the need for amplifiers down to eight or less. Communication in
an HFC cable TV network can be bidirectional.
1.8.1 Cable TV for Data Transfer: Cable companies are now competing with telephone compa -
nies for the residential customer who wants high-speed data transfer. This section deals with
1. Bandwidth
2. Sharing.
3. CM and CMTS
4. Data Transmission Schemes: Data Over Cable System Interface Specification (DOCSIS).
1. Bandwidth: The coaxial cable has a bandwidth that ranges from 5 to750 MHz (approx).
To provide Internet access, the cable company has divided this bandwidth into three bands:
1. Video
2. Downstream data
3. Upstream data bands. Shown in fig 1.36
Figure 1.36: Division of coaxial cable band by CATV
Downstream Video Band:
 It occupies frequencies from 54 to 550 MHz.
 Each TV channel occupies 6 MHz; this can accommodate more than 80 channels.
Downstream Data Band
 It occupies the upper band, from 550 to 750 MHz
 This band is also divided into 6-MHz channels.
 Modulation Downstream data band uses the 64-QAM modulation technique.
 The theoretical downstream data rate is 30 Mbps.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 29
Upstream Data Band:
 It occupies the lower band, from 5 to 42 MHz
 This band is also divided into 6-MHz channels.
 Upstream data are modulated using the QPSK modulation technique due to high noise.
 Data Rate is 12 Mbps, upstream data can be sent at (2 bits/Hz x 6 MHz).
2. Sharing: Both upstream and downstream bands are shared by the subscribers.
Upstream Sharing: The upstream data bandwidth is 37 MHz. Only six 6-MHz channels available
in the upstream direction. A subscriber needs to use one channel to send data in the upstream
direction. The question is, "How can six channels be shared in an area with 1000, 2000, or
even100, 000 subscribers?" The solution is timesharing.
Downstream Sharing: The downstream band has 33 channels of 6 MHz. A cable provider
probably has more than 33 subscribers; therefore, each channel must be shared between a
group of subscribers
3. CM and CMTS:*** To use a cable network for data transmission, need two key devices:
1. Cable Modem(CM)
2. Cable Modem Transmission System (CMTS).
1. The cable modem (CM): It is installed on the subscriber premises. It is similar to an ADSL
modem, as shown in figure 1.37.
Figure 1.37 Cable modem (CM)
2. Cable Modem Transmission System (CMTS): The cable modem transmission system (CMTS) is
installed inside the distribution hub by the cable company. It receives data from the Internet
and passes them to the combiner, which sends them to the subscriber. The CMTS also receives
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 30
data from the subscriber and passes them to the Internet. Figure 1.38 shows the location of the
CMTS.
Figure 1.38 Cable modem transmission system (CMTS)
4. Data Transmission Schemes: DOCSIS: Multimedia Cable Network Systems (MCNS) designed to
create a standard for data transmission over an HFC network called “Data Over Cable System
Interface Specification “(DOCSIS). DOCSIS defines all the protocols need to transport data from a
CMTS to a CM.
Upstream Communication: The following is a very simplified version of the protocol defined by
DOCSIS for upstream communication. It describes the steps that must be followed by a CM:
1. The CM checks the downstream channels for a specific packet periodically sent by the CMTS.
2. The packet asks any new CM to announce itself on a specific upstream channel.
3. The CMTS sends a packet to the CM, defining its allocated downstream and upstream
channels.
4. The CM then starts a process, called ranging, which determines the distance between the CM
and CMTS. This process is required for synchronization between all CMs and CMTSs for the
minislots used for timesharing of the upstream channels.
5. The CM sends a packet to the ISP, asking for the Internet address.
6. The CM and CMTS then exchange some packets to establish security parameters, which are
needed for a public network such as cable TV.
7. The CM sends its unique identifier to the CMTS.
8. Upstream communication can start in the allocated upstream channel; the CM can contend
for the mini-slots to send data.
Downstream Communication: In the downstream direction, the communication is much simpler.
There is no contention because there is only one sender. The CMTS sends the packet with the
address of the receiving CM, using the allocated downstream channel.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 31
SUMMARY OF UNIT ONE: NETWORK MODELS
 The ISO created a model called the OSI, which allows diverse systems to communicate.
 The seven-layer OSI model provides guidelines for the development of universally
compatible networking protocols.
 The physical, data link, and network layers are the network support layers.
 The session, presentation, and application layers are the user support layers.
 The transport layer links the network support layers and the user support layers.
 The physical layer coordinates the functions required to transmit a bit stream over a physical
medium.
 The data link layer is responsible for delivering data units from one station to the next
without errors.
 The network layer is responsible for the source-to-destination delivery of a packet across
multiple network links.
 The transport layer is responsible for the process-to-process delivery of the entire message.
 The session layer establishes, maintains, and synchronizes the interactions between
communicating devices.
 The presentation layer ensures interoperability between communicating devices through
transformation of data into a mutually agreed upon format.
 The application layer enables the users to access the network.
 TCP/IP is a five-layer hierarchical protocol suite developed before the OSI model.
 The TCP/IP application layer is equivalent to the combined session, presentation, and
application layers of the OSI model.
 Four levels of addresses are used in an internet following the TCP/IP protocols: physical (link)
addresses, logical (IP) addresses, port addresses, and specific addresses.
 The physical address, or link address, is the address of a node as defined by its LAN or WAN.
 The IP address uniquely defines a host on the Internet.
 The port address identifies a process on a host.
 Specific address is a user-friendly address.
 The telephone, which is referred to as the plain old telephone system (POTS), was originally
an analog system. During the last decade, the telephone network has undergone many
technical changes. The network is now digital as well as analog.
 The telephone network is made of three major components: local loops, trunks, and
switching offices.
 It has several levels of switching offices such as end offices, tandem offices, and regional
offices.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 32
 The Telephone service called LATAs. The services offered inside a LATA are called intra-LATA
services. The carrier that handles these services is called a local exchange carrier (LEC).
 In in-band signaling, the same circuit is used for both signaling and data.
 In out-of- band signaling, a portion of the bandwidth is used for signaling and another
portion for data.
 The protocol that is used for signaling in the telephone network is called Signaling System
Seven (SS7).
 Telephone companies provide two types of services: analog and digital. We can categorize
analog services as either analog switched services or analog leased services.
 The two most common digital services are switched/56 service and digital data Service
(DDS).
 Data transfer using the telephone local loop was traditionally done using a dial-up modem.
 The term modem is a composite word that refers to: a signal modulator and a signal
demodulator.
 Most popular modems available are based on the V-series standards. The V.32 modem has a
data rate of 9600 bps. The V32bis modem supports 14,400-bps transmission.
 V90 modems, called 56K modems, with a downloading rate of 56 kbps and uploading rate of
33.6 kbps are very common. The standard above V90 is called V92.
 These modems can adjust their speed, and if the noise allows, they can upload data rate of
48 kbps.
 Telephone companies developed another technology, digital subscriber line (DSL), to provide
higher-speed access to the Internet. DSL technology is a set of technologies, each differing in
the first letter (ADSL, VDSL, HDSL, and SDSL. ADSL provides higher speed in the downstream
direction than in the upstream direction
 The high-bit rate digital subscriber line (HDSL) was designed as an alternative to the T-l line
(1.544 Mbps). The symmetric digital subscriber line (SDSL) is a one twisted- pair version of
HDSL.
 The very high-bit-rate digital subscriber line (VDSL) is an alternative approach that is similar
to ADSL.
 Community antenna TV (CATV) was originally designed to provide video services for the
community. The traditional cable TV system used coaxial cable end to end.
 The second generation of cable networks is called a hybrid fiber-coaxial (HFC) n/w. The
network uses a combination of fiber-optic and coaxial cable.
 Cable companies are now competing with telephone companies for the residential
Customer who wants high-speed access to the Internet.
 To use a cable network for data transmission, we need two key devices: a cable modem (CM)
and a cable modem transmission system (CMTS).
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 33
UNIT -1 NETWORK MODEL QUESTION BANK
1. List the layers of the Internet model.
2. Which layers in the Internet model are the network support layers?
3. Which layer in the Internet model is the user support layer?
4. What is the difference between network layer delivery and transport layer delivery?
5. What is a peer-to-peer process?
6. How does information get passed from one layer to the next in the Internet model?
7. What are headers and trailers, and how do they get added and removed?
8. What are the concerns of the physical layer in the Internet model?
9. What are the responsibilities of the data link layer in the Internet model?
10. What are the responsibilities of the network layer in the Internet model?
11. What are the responsibilities of the transport layer in the Internet model?
12. What is the difference between a port address, a logical address, and a physical address?
13. Name some services provided by the application layer in the Internet model.
14. How do the layers of the Internet model correlate to the layers of the OSI model?
15. How are OSI and ISO related to each other?
16. Match the following to one or more layers of the OSI model:
a. Route determination
b. Flow control
c. Interface to transmission media
d. Provides access for the end user
17. Match the following to one or more layers of the OSI model:
a. Reliable process-to-process message delivery
b. Route selection
c. Defines frames
d. Provides user services such as e-mail and file transfer
e. Transmission of bit stream across physical medium
18. Match the following to one or more layers of the OSl model:
a. Communicates directly with user's application program
b. Error correction and retransmission
c. Mechanical, electrical, and functional interface
d. Responsibility for carrying frames between adjacent nodes
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 34
19. Match the following to one or more layers of the OSI model:
a. Format and code conversion services
b. Establishes, manages, and terminates sessions
c. Ensures reliable transmission of data
d. Log-in and log-out procedures
e. Provides independence from differences in data representation
20. What are the three major components of a telephone network?
21. Give some hierarchical switching levels of a telephone network.
22. What is LATA? What are intra-LATA and inter-LATA services?
23. Describe the SS7 service and its relation to the telephone network.
24. What are the two major services provided by telephone companies in the United States?
25. What is dial-up modem technology? List some of the common modem standards and their
data rates.
26. What is DSL technology? What are the services provided by the telephone companies using
DSL? Distinguish between a DSL modem and a DSLAM.
27. Compare and contrast a traditional cable network with a hybrid fiber-coaxial network.
28. How data transfer is achieved using CATV channels?
29. Distinguish between CM and CMTS.
30. Why circuit-switching was chosen for telephone networks?
31. Define end-to-end addressing in a telephone network when two parties communicate.
32. When we have an overseas telephone conversation, we sometimes experience a delay. Give
the reason?
33. Draw a bar chart to compare the different downloading data rates of common modems.
34. Draw a bar chart to compare the different downloading data rates of common DSL
technology implementations (use minimum data rates).
35. Calculate the minimum time required to download one million bytes of information using
each of the following technologies:
a. V32 modem
b. V32bis modem
c. V90 modem
36. Repeat Exercise 17 using different DSL implementations (consider the minimum rates).
37. Repeat Exercise 17 using a cable modem (consider the minimum rates).
38. What type of topology is used when customers in an area use DSL modems for data transfer
purposes? Explain.
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 35
UNIT 1- NETWORK MODEL- SOLVED EXAMPLES
1. Match the following to one or more layers of the OSI model:
a. Route determination – Network Layer
b. Flow control- Data Link Layer
c. Interface to transmission media- Physical Layer
d. Provides access for the end user- Application layer
2. Match the following to one or more layers of the OSI model:
a. Reliable process-to-process message delivery – Transport Layer
b. Route selection - Network Layer
c. Defines frames - Data Link Layer
d. Provides user services such as e-mail and file transfer- Application layer
e. Transmission of bit stream across physical medium - Physical Layer
3. Match the following to one or more layers of the OSl model:
a. Communicates directly with user's application program- Transport Layer
b. Error correction and retransmission - Transport Layer
c. Mechanical, electrical, and functional interface - Physical Layer
d. Responsibility for carrying frames between adjacent nodes - Data Link Layer
4. Match the following to one or more layers of the OSI model:
a. Format and code conversion services - Presentation Layer
b. Establishes, manages, and terminates sessions – session layer
c. Ensures reliable transmission of data - Data link and transport layers
d. Log-in and log-out procedures - session layer
e. Provides independence from differences in data representation - Presentation Layer
5. Calculate the minimum time required to download one million bytes of information using
each of the following technologies:
a. V32 modem
b. V32bis modem
c. V90 modem
d. ADSL modem
e. Cable modem
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 36
Solution:
(a). V.32 modem :
 It has data rate of 9600bps
 Minimum time required to down load = Data size / data rate
= (10, 00, 000 / 9600) Χ 8
= 834 seconds
= 13 min 54 sec
(b). V.32 bis modem :
 It has data rate of 14,400 bps
 Minimum time required to down load = Data size / data rate
= (10, 00, 000 / 14,400) Χ 8
= 556 seconds
= 9 min 16 sec
(b). V.90 modem :
 It has data rate of 56,000 bps
 Minimum time required to down load = Data size / data rate
= (10, 00, 000 / 56,000) Χ 8
= 143 seconds
= 2 min 23 sec
(b). ADSL modem :
 It has data rate of 13.4 Mbps
 Minimum time required to down load = Data size / data rate
= (10, 00, 000 / 13.4 Χ 106
) Χ 8
= 0.596 seconds
(b). Cable TV modem :
 It has data rate of 30 Mbps
 Minimum time required to down load = Data size / data rate
= (10, 00, 000 / 30 Χ 106
) Χ 8
= 0.266 seconds
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 37
UNIT 1- NETWORK MODEL
UNIVERSITY QUESTIONS AND ANSWER
1 a. Show the layer representation in the TCP/IP model and the OSI model and explain.
(Dec 09/ Jan 10 – 10marks –Answer refer page no. 2 and 11)
b. Give a brief overview of SS7 signaling. (Dec 09/ Jan 10 – 05marks –Ans refer page no.18)
c. Match the following functions to the appropriate layers in the OSI model.
(Dec 09/ Jan 10 – 05marks)
I. Dividing the transmitted bit stream into frames: Answer- Data Link Layer
II. Determining the route to be used through the subnet: Answer- Network Layer
III. Reliable process to process message delivery: Answer- Transport Layer
IV. Format and code conversion services: Answer- Presentation Layer
V. Accessing the World Wide Web: Answer- Application Layer
2 a. Explain OSI model, with a neat diagram. Consider a source, destination machine and some
intermediate nodes for discussion.(May/ June 10 – 10marks –Ans refer page no.3 to 5)
b. How addresses employed (used) in internet employing TCP/IP protocol can be classified?
(May/ June 10 – 02 marks –Answer refer page no.13 to 15)
c. What is DSL technology? List different DSL’s available. Discuss salient feature of ASDL.
(May/ June 10 – 08marks –Answer refer page no.22 and 23)
3 a. What are the levels of addresses that are used in internet, employing the TCP/IP protocols?
(December 10 – 10marks –Answer refer page no.13 to 15)
b. What are different types of services provided by telephone networks? (December 10 –
06marks –Answer refer page no.20)
c. Name the major components of a telephone network. (December 10 – 04marks –Answer
refer page no.16)
4 a. With a neat diagram, explain the TCP/IP reference model, giving a brief description of the
protocols in each layer (June/July 2011 – 10marks –Answer refer page no.11)
b. Differentiate between CM and CMTS. (June/July 2011 – 04marks –Ans refer page no.28)
c. Explain the operation of ADSL using discreet multi one modulations indicating the different
channels, with a neat diagram. (June/July 2011 – 06marks –Answer refer page no.22 &23)
Computer Communication Network: Unit 1- Network Mode
Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 38
5 a. Explain the difference between OSI reference model and TCP/IP reference model
(December 2011 – 05marks –Answer refer page no.13)
b. Match the following to one or more layers in OSI model: (December 2011 – 05marks)
i. Route determination: Answer- Network Layer
ii. Flow control: Answer- Transport Layer
iii. Interface to transmission media: Answer- Physical Layer
iv. Provides access for end user: Answer- Application Layer
v. Format and code conversion services: Answer- Presentation Layer
c. What is DSL technology? What are the services provided by the telephone companies using
DSL? Distinguish between DSL and DSLAM (December 2011 – 10marks –Answer refer
page no.22 and 23)
6. a. Describe the ISO OSI reference model of a computer network. Discuss the function of
Each layer. (December 2012 – 10 marks –Answer refer page no.2 and 5)
b. Describe the SS7 service and its relation to the telephone network. (December 2012 –
05marks –Answer refer page no.19 and 20)
c. Distinguish between a DSL modem and a DSLAM. December 2012 – 05marks –Answer
refer page no.22)
7.(a) Explain briefly with relevant examples, the 4 levels of address that are used in an internet
employing the TCP/IP Protocols.( June/July 2013 – 10marks –Ans refer page no. 13)
(b). Briefly describe the function of physical layer and data link layer ( June /July 2013 –
06 marks –Answer refer page no.5 and 6 )
(c).Explain the operation of ADSL using Discrete Multitone Technique indicating the different
channels with diagram.( June/July 2013 – 04 marks –Answer refer page no.24 )

More Related Content

What's hot

Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 
2. wireless propagation models free space propagation
2. wireless propagation models   free space propagation2. wireless propagation models   free space propagation
2. wireless propagation models free space propagationJAIGANESH SEKAR
 
Discrete cosine transform
Discrete cosine transformDiscrete cosine transform
Discrete cosine transformaniruddh Tyagi
 
Lecture notes on mobile communication
Lecture notes on mobile communicationLecture notes on mobile communication
Lecture notes on mobile communicationInocentshuja Ahmad
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Paulo_Vangui
 
signal and channel bandwidth
signal and channel bandwidthsignal and channel bandwidth
signal and channel bandwidthAparnaLal2
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCPselvakumar_b1985
 
Lecture 2 evolution of mobile cellular
Lecture 2  evolution of mobile cellular Lecture 2  evolution of mobile cellular
Lecture 2 evolution of mobile cellular Chandra Meena
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer modeaniston0108
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulatorsSyedAhamed44
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocolsFabMinds
 

What's hot (20)

Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
TinyOS
TinyOSTinyOS
TinyOS
 
2. wireless propagation models free space propagation
2. wireless propagation models   free space propagation2. wireless propagation models   free space propagation
2. wireless propagation models free space propagation
 
Discrete cosine transform
Discrete cosine transformDiscrete cosine transform
Discrete cosine transform
 
Lecture notes on mobile communication
Lecture notes on mobile communicationLecture notes on mobile communication
Lecture notes on mobile communication
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
signal and channel bandwidth
signal and channel bandwidthsignal and channel bandwidth
signal and channel bandwidth
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Cellular network
Cellular networkCellular network
Cellular network
 
Chap 3
Chap 3Chap 3
Chap 3
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCP
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Lecture 2 evolution of mobile cellular
Lecture 2  evolution of mobile cellular Lecture 2  evolution of mobile cellular
Lecture 2 evolution of mobile cellular
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 

Viewers also liked

Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2SURESHA V
 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7SURESHA V
 
Wireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th semWireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th semSURESHA V
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
 
Ccn unit1 for 7th SEM EC by Prof. suresha V
Ccn unit1 for 7th SEM EC by Prof. suresha VCcn unit1 for 7th SEM EC by Prof. suresha V
Ccn unit1 for 7th SEM EC by Prof. suresha VSURESHA V
 
Ccn unit1-Prof .suresha v
Ccn unit1-Prof .suresha vCcn unit1-Prof .suresha v
Ccn unit1-Prof .suresha vSURESHA V
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vSURESHA V
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsSURESHA V
 
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...Edureka!
 

Viewers also liked (9)

Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2
 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7
 
Wireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th semWireless communication, UNIT 3, EC students, 8th sem
Wireless communication, UNIT 3, EC students, 8th sem
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
Ccn unit1 for 7th SEM EC by Prof. suresha V
Ccn unit1 for 7th SEM EC by Prof. suresha VCcn unit1 for 7th SEM EC by Prof. suresha V
Ccn unit1 for 7th SEM EC by Prof. suresha V
 
Ccn unit1-Prof .suresha v
Ccn unit1-Prof .suresha vCcn unit1-Prof .suresha v
Ccn unit1-Prof .suresha v
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha v
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU students
 
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
 

Similar to CCN -UNIT 1 PDF Notes for 7th EC

Similar to CCN -UNIT 1 PDF Notes for 7th EC (20)

Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
DCN _ unit 2.pptx
DCN _ unit 2.pptxDCN _ unit 2.pptx
DCN _ unit 2.pptx
 
OSI 7 layer Architecture and explain the functions of each layer
OSI 7 layer Architecture and explain the functions of each layerOSI 7 layer Architecture and explain the functions of each layer
OSI 7 layer Architecture and explain the functions of each layer
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
ch02 - Network Models- powerpoint-lecture
ch02 - Network Models- powerpoint-lecturech02 - Network Models- powerpoint-lecture
ch02 - Network Models- powerpoint-lecture
 
Ch 2 network
Ch 2 networkCh 2 network
Ch 2 network
 
Osi model
Osi modelOsi model
Osi model
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Assignment izaz sir
Assignment izaz sirAssignment izaz sir
Assignment izaz sir
 
OSI Pankaj yadav
OSI  Pankaj yadavOSI  Pankaj yadav
OSI Pankaj yadav
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
 
Computer netwrks
Computer netwrksComputer netwrks
Computer netwrks
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
 
OSI model
OSI modelOSI model
OSI model
 

More from SURESHA V

RM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
RM&IPR-21RMI56 - Module 1- by Dr. Suresha VdfRM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
RM&IPR-21RMI56 - Module 1- by Dr. Suresha VdfSURESHA V
 
IoT module 4 - 22ETC15H-2022-23 by Dr.SV.pdf
IoT  module 4 -  22ETC15H-2022-23 by Dr.SV.pdfIoT  module 4 -  22ETC15H-2022-23 by Dr.SV.pdf
IoT module 4 - 22ETC15H-2022-23 by Dr.SV.pdfSURESHA V
 
IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
IoT  module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdfIoT  module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdfSURESHA V
 
IoT module 2- 22ETC15H-2022-23 by Dr.Suresha V image.pdf
IoT  module 2- 22ETC15H-2022-23 by Dr.Suresha V image.pdfIoT  module 2- 22ETC15H-2022-23 by Dr.Suresha V image.pdf
IoT module 2- 22ETC15H-2022-23 by Dr.Suresha V image.pdfSURESHA V
 
Intro. IoT Module 1- 22ETC15H by Dr.Suresha V.pdf
Intro. IoT Module 1- 22ETC15H by Dr.Suresha V.pdfIntro. IoT Module 1- 22ETC15H by Dr.Suresha V.pdf
Intro. IoT Module 1- 22ETC15H by Dr.Suresha V.pdfSURESHA V
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1SURESHA V
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1SURESHA V
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VSURESHA V
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha VSURESHA V
 

More from SURESHA V (9)

RM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
RM&IPR-21RMI56 - Module 1- by Dr. Suresha VdfRM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
RM&IPR-21RMI56 - Module 1- by Dr. Suresha Vdf
 
IoT module 4 - 22ETC15H-2022-23 by Dr.SV.pdf
IoT  module 4 -  22ETC15H-2022-23 by Dr.SV.pdfIoT  module 4 -  22ETC15H-2022-23 by Dr.SV.pdf
IoT module 4 - 22ETC15H-2022-23 by Dr.SV.pdf
 
IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
IoT  module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdfIoT  module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
IoT module 3- 22ETC15H-2022-23 by Dr.Suresha V1.pdf
 
IoT module 2- 22ETC15H-2022-23 by Dr.Suresha V image.pdf
IoT  module 2- 22ETC15H-2022-23 by Dr.Suresha V image.pdfIoT  module 2- 22ETC15H-2022-23 by Dr.Suresha V image.pdf
IoT module 2- 22ETC15H-2022-23 by Dr.Suresha V image.pdf
 
Intro. IoT Module 1- 22ETC15H by Dr.Suresha V.pdf
Intro. IoT Module 1- 22ETC15H by Dr.Suresha V.pdfIntro. IoT Module 1- 22ETC15H by Dr.Suresha V.pdf
Intro. IoT Module 1- 22ETC15H by Dr.Suresha V.pdf
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1
 
Wc & lte 4 g module 4- 2019 by prof.sv1
Wc & lte 4 g  module 4- 2019 by prof.sv1Wc & lte 4 g  module 4- 2019 by prof.sv1
Wc & lte 4 g module 4- 2019 by prof.sv1
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha V
 

Recently uploaded

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

CCN -UNIT 1 PDF Notes for 7th EC

  • 1. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 1 UNIT - 1- NETWORK MODELS Learning Objectives: Upon completion of this unit, the student should be able to:  Understand the need for computer communication networks.  Be familiar with the OSI and TCP/IP models.  Understand the responsibilities of each layer in OSI and TCP/IP models.  Discuss the types of addresses are used in TCP/IP protocols.  Understand telephone and cable networks used for data transmission.  Discuss the Signaling System Seven (SS7) used in networks.  Explains the different services offered by Telephone Networks.  Explains the Digital Subscriber Line (DSL) and its versions for ISDN services.  Discuss the most popular modems are available for data transmission. 1. Introduction : Data communications and networking are changing the way we live. Computer Communication Network (CCN) deals with four major concepts. They are 1. Data communications 2. Networking 3. Protocols and standards and 4. Networking models. Networks exist so that data may be sent from one place to another-the basic concept of data communications. Data communications between remote parties can be achieved through a process called networking. Protocols and standards are vital to the implementation of data communications and networking. Protocols refer to the set of rules and regulations; a standard is a protocol that has been adopted by vendors and manufacturers. Network models serve to organize, unify, and control the hardware and software components of data communications and networking. A network is a combination of hardware and software that sends data from one location to another. The hardware consists of the physical equipment that carries signals from one point of the network to another. The software consists of instruction sets that make possible the services that we expect from a network. Computer networks are very complex object; hence it is partitioned in to vertical set of levels, each level called layer.
  • 2. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 2 1.1 Layered tasks: We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office. Figure 1.1 shows the tasks involved in sending a letter Figure 1.1 Tasks involved in sending a letter The task includes a sender, a receiver, and a carrier that transports the letter. There is a hierarchy of tasks. Higher Layer, Middle Layer and Lower Layer. Each layer performs specific tasks and uses the services of the layer immediately below it. 1.2 The OSI Model: ***  It is a 7 layers model.  It is an Open Systems Interconnection model.  It was first introduced in the late 1970s.  OSI developed by International Standards Organization (ISO). The purpose of the OSI model:  To show how to facilitate communication between different systems without requiring changes to the logic of the underlying hardware and software.  The OSI model is not a protocol; it is a model for understanding and designing a network architecture that is flexible, robust, and interoperable.  The OSI model is a layered framework for the design of network systems that allows communication between all types of computer systems.
  • 3. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 3 Layered Architecture: The OSI model is composed of seven layers: 1. Physical Layer 2. Data link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer and 7. Application Layer The structure of seven layers in OSI model as shows figure 1.2 Figure 1.2 Seven layers of the OSI model Layers are designed to identify which networking functions had related uses and collected those functions into discrete groups that became the layers. The OSI model allows complete interoperability between networks. The Each layer uses the services of the layer immediately below it. Peer-to-Peer Processes: Layer x on one machine communicates with layer x on another machine called Peer-to-Peer Processes. This communication is governed by an agreed-upon series of rules and conventions called protocols. Communication between machines is therefore a peer-to-peer process using the protocols appropriate to a given layer, which is shown in figure 1.3. Interfaces between Layers: Each interface defines what information and services a layer must provide for the layer above it. Well defined interfaces and layer functions provide modularity to a network.
  • 4. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 4 Figure 1.3 The interaction between layers in the OSI model Organizations of the layers: The seven layers can be thought of as belonging to three subgroups. It allows interoperability among unrelated software systems 1. Network support layers : Physical (layer1), Data link (layer2), Network (layer3). 2. User support layers : Session (layer5), Presentation (layer6),Application (layer7) 3. Transport layer (Layer 4) : Links the above two layers subgroups Data flow mechanism in OSI model: The figure 1.4 gives an overall view of the OSI layers. Figure 1.4 An exchange using the OSI model
  • 5. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 5 Data flow: D7 means the data unit at layer 7, D6 means the data unit at layer 6, and so on. The process starts at layer 7 then moves from layer to layer in descending, sequential order. At each layer, a header, or possibly a trailer, can be added to the data unit. Commonly, the trailer is added only at layer 2. When the formatted data unit passes through the physical layer (layer 1), it is changed into an electromagnetic signal and transported along a physical link. The reverse process occurs in the receiver side and the message is again in a form appropriate to the application and is made available to the recipient. The data portion of a packet at level N-1 carries the whole packet from level N. The concept is called “encapsulation”. 1.3 Layers in the OSI Model: This section briefly describes the functions of each layer in the OSI model. 1. Physical Layer: It layer coordinates the functions required to transmit a bit stream over a physical medium. It is responsible for movements of individual bits from one hop (node) to the next. It deals with the mechanical and electrical specification of the primary connections like cable, connectors etc. Figure 1.5 Physical layer Physical layer is concerned with the following: • Physical characteristics of interfaces and medium: Types of medium and interfaces. • Representation of bits: 1’s or 0’s Encoded in to Electrical or optical. • Data rate: transmission rate: Speed in bps. • Synchronization of bits: Both Transmitter and Receiver are in the same clock. • Line configuration: Point to Point or Multipoint transmission. • Physical topology: Way in which the network formed, ring bus, etc. • Transmission mode: Simplex, Half or Full Duplex.
  • 6. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 6 2. Data Link Layer: The data link layer is responsible for moving frames from one hop (node) to the next hop. Figure 1.6 Data link layer Major duties of Data Link Layer:  Framing  Physical addressing  Flow control  Error control  Access control Figure 1.7 illustrates hop-to-hop (node-to-node) delivery by the data link layer Figure 1.7 Hop-to-Hop deliveries As the figure 1.7 shows, communication at the DLL occurs between two adjacent nodes. To send data from A to F, three partial deliveries are made. First, the DLL at A sends a frame to the DLL at B (a router). Second, the data link layer at B sends a new frame to the data link layer at E. Finally,
  • 7. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 7 the DLL at E sends a new frame to the DLL at F. Note that the frames that are exchanged between the three nodes have different values in the headers. The frame from A to B has B as the destination address and A as the source address. The frame from B to E has E as the destination address and B as the source address. The frame from E to F has F as the destination address and E as the source address. 3. Network Layer: It is responsible for the delivery of individual packets from the source host to the destination host. Other responsibilities of network layer includes  Logical addressing  Routing Figure 1.8 Network layer Figure 1.9 illustrates end-to-end delivery by the network layer. Figure 1.9 Source-to-destination delivery
  • 8. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 8 4. Transport Layer: It is responsible for the delivery of a message from one process to another. A process is an application program running on a host. It ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level. Figure1.10 shows the relationship of the transport layer to the network and session layers. Figure 1.10 Transport layer Other responsibility of the transport layer includes the following: 1. Service-point addressing. 2. Segmentation and reassembly. 3. Connection control. 4. Flow control. 5. Error control. Figure 1.11 Illustrates process-to-process delivery by the transport layer. Figure 1.11 Reliable process-to-process delivery of a message
  • 9. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 9 5. Session Layer: The session layer is responsible for dialog control and synchronization. Specific responsibilities of the session layer include the following: 1 .Dialog control: The session layer allows two systems to enter into a dialog. It allows the communication between two processes to take place in either half-duplex full-duplex mode. 2. Synchronization: The session layer allows a process to add checkpoints, or synchronization points, to a stream of data Figure 1.12 Session layer 6. Presentation Layer: The presentation layer is concerned with the syntax and semantics of the information exchanged between two systems. Figure 1.13 shows the relationship between the presentation layer and the application and session layers Figure 1.13 Presentation layer Specific responsibilities of the presentation layer are 1. Translation: Different computers use different encoding systems, the presentation layer is responsible for interoperability between these different encoding methods. The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its receiver-dependent format.
  • 10. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 10 2. Encryption: It ensures privacy for carry sensitive information by sending the information in other form. 3. Compression: Data compression reduces the number of bits contained in the information. It becomes particularly important in the transmission of multimedia such as text, audio, and video. 7. Application Layer: The application layer is responsible for providing services to the user. Figure 1.14 Application layer The major duties of the application:  Network virtual terminal: Enable to user for remote login  File transfer, access, and management  Mail services  Directory services Summary of Layers : Figure 1.15 Summary of layers
  • 11. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 11 1.4 TCP / IP PROTOCOL SUITE (Transmission Control Protocol / Internet Protocol)*** TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a specific functionality. TCP/IP protocol suite was defined as having four layers shown in fig 1.16 1. Host-To-Network. 2. Internet. 3. Transport and 4. Application. Figure 1.16 TCP/IP and OSI model In figure 1.16 TCP/IP is compared to OSI, Here host-to-network layer is equivalent to the combination of the physical and data link layers. The internet layer is equivalent to the network layer, and the application layer is roughly doing the job of the session, presentation, and application layers with the transport layer in TCP/IP taking care of part of the duties of the session layer. TCP / IP PROTOCOL SUITE: It consists of four layers; they are 1. Host-To-Network 2. Internet, 3. Transport and 4. Application layers. This is shown in figure 1.17. TCP / IP PROTOCOL layers description: 1. Host-to-network layer: In this layer TCP/IP does not define any specific protocol. It supports all the standard and proprietary protocols. A network in a TCP/IP internetwork can be a local area network (LAN) or a wide-area network (WAN).
  • 12. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 12 Figure 1.17 TCP/IP and OSI model 2. Network Layer (IP layer): TCP/IP supports the Internetworking Protocol. IP uses four supporting protocols: ARP, RARP, ICMP, and IGMP. 1. ARP (Address Resolution Protocol) 2. RARP (Reverse Address Resolution Protocol) 3. ICMP (Internet Control Message Protocol) 4. IGMP (Internet Group Message Protocol) 1. Internetworking Protocol (IP): It is an unreliable and connectionless protocol-a best-effort delivery service. IP transports data in packets called datagram, each of which is transported separately. Datagram’s can travel along different routes and can arrive out of sequence or be duplicated. IP does not keep track of the routes and has no facility for reordering datagram once they arrive at their destination. 2. Address Resolution Protocol (ARP): It is used to associate a logical address with a physical address. ARP is used to find the physical address of the node when its Internet address is known. 3. Reverse Address Resolution Protocol (RARP): It allows a host to discover its Internet address when it knows only its physical address. It is used when a computer is connected to a network for the first time or when a diskless computer is booted. 4. Internet Control Message Protocol (ICMP): It is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. ICMP sends query and error reporting messages. 5. Internet Group Message Protocol (IGMP): The Internet Group Message Protocol (IGMP) is used to facilitate the simultaneous transmission of a message to a group of recipients.
  • 13. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 13 3. Transport Layer: This layer was represented in TCP/IP by two protocols, TCP and UDP. These protocols are responsible for delivery of a message from a process to another process. a. UDP (User Datagram Protocol): It is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. b. TCP (Transmission Control Protocol): It provides full transport-layer services to applications. It is a reliable stream transport protocol. It gives connection-oriented: A connection must be established between both ends services. c. SCTP (Stream Control Transmission Protocol): It provides support for newer applications such as voice over the Internet. It is a transport layer protocol that combines the best features of UDP and TCP. 5.Application Layer: It support user interface with network. many protocols are defined at this layer are:  HTTP(Hypertext Transfer Protocol):enables the connection between a web server and a client  SMTP(Simple Mail Transfer Protocol): An electronic mail (e-mail) allows users to send mails across an internet.  c FTP(File Transfer Protocol): Enables user to transfer the data file  DNS(Domain Naming System): client to remote login  TELNET : Tele communication protocol, VoIP 6. Comparison between OSI and TCP/IP Model OSI Model TCP/IP MODEL It is a 7 layers model It is a 4 layers model Protocols are more hidden Protocols are less hidden Model comes first and next protocol Protocol comes first and next Model Each layer having less specific functionality Each layer having more specific functionality Supports both connection and connectionless oriented services in network layer It mainly supports connection less services in network layer Only connection oriented services in transport layer Both connection and connectionless oriented services in transport layers
  • 14. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 14 1.5 ADDRESSING*** Four levels of addresses are used in an internet employing the TCP/IP protocols: 1. Physical addresses 2. Logical addresses 3. Port addresses, and 4. Specific addresses Figure1.17 Addresses in TCP/IP 1. Physical Addresses: It also known as the link address, is the address of a node as defined by its LAN or WAN. It is included in the frame used by the data link layer. The physical addresses have authority over the network (LAN or WAN).The size and format of these addresses vary depending on the network. Example 1.1: In Figure 1.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link. As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. Figure 1.19 Physical addresses Example 1.2: Most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
  • 15. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 15 2. Logical Addresses: Logical addresses are necessary for universal communications that are independent of underlying physical networks. Physical addresses are not adequate in an internetwork environment where different networks can have different address formats. A universal addressing system is needed in which host can be identified uniquely, regardless of the underlying physical network. Example 1.3: Figure 1.20 shows a part of an internet with two routers connecting three LANs. Each device has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. The physical addresses will change from hop to hop, but the logical addresses usually remain the same. Figure 1.20 IP addresses 3. Port Addresses: The IP and the physical address are necessary for a quantity of data to travel from a source to the destination host. The end object of Internet communication is a process communicating with another process. For these processes to receive data simultaneously, we need a method to label assigned to a process is called a port address. A port address in TCP/IP is 16 bits in length. The physical addresses will change from hop to hop, but the logical and port addresses usually remain the same. Example 1.4: Figure 1.21. Shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that
  • 16. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 16 although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Figure 1.21 Port addresses Example 1.5: Port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number 4. Specific Addresses: Some applications have user-friendly addresses that are designed for that specific address.  E-mail address  URL (Universal Resource Locator)
  • 17. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 17 1.6 TELEPHONE NETWORK: 1. Introduction: It is beginnings in the late 1800s.Originally an analog system using analog signals to transmit voice. The entire network, which is referred to as the plain old telephone system (POTS).Telephone networks use circuit switching. Telephone System: Figure 1.22 Telephone system Major components of Telephone System: 1. Local Loops: A twisted-pair cable that connects the subscriber telephone to the nearest end office or local central office. Its B.W is 4 kHz for voice communication. The first three digits of a local telephone number define the office, and the next four digits define the local loop number. 2. Trunks: Trunks are transmission media that handle the communication between offices. Trunk normally handles hundreds or thousands of connections through multiplexing. transmission is usually through optical fibers or satellite links. 3. Switching Offices: To avoid having a permanent physical link between any two subscribers, the telephone company has switches located in a switching office. Switch connects several local loops or trunks and allows a connection between different subscribers 2. Local-Access Transport Areas (LATAs): A LATA can be a small or large metropolitan area. A small state may have one single LATA; a large state may have several LATAs. A LATA boundary may overlap the boundary of a state; part of a LATA can be in one state, part in another state. Two types of LATAs Services a) Intra-LATA Services b) Inter-LATA Services a) Intra-LATA Services: The services offered by the common carriers (telephone companies) inside a LATA are called intra-LATA services.
  • 18. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 18 Figure 1.23 Switching offices in a LATA The carrier that handles these services is called a local exchange carrier (LEC). Before the Telecommunications Act of 1996 intra-LATA services were granted to one single carrier. This was a monopoly. After 1996, more than one carrier could provide services inside a LATA. The carrier that provided services before 1996 owns the cabling system (local loops) and is called the Incumbent Local Exchange Carrier (ILEC).The new carriers that can provide services are called Competitive Local Exchange Carriers (CLECs). CLECs would provide other services such as mobile telephone service, toll calls inside a LATA, and so on. Communication inside a LATA is handled by end switches and tandem switches. A call that can be completed by using only end offices is considered toll-free. A call that has to go through a tandem office (intra-LATA toll office) is charged. b). Inter-LATA Services: The services between LATAs called Inter-LATA Services. Figure 1.24 Point of Presences (POPs) These services handled by Interexchange Carriers (IXCs).IXCs sometimes called long-distance companies, provide communication services between two customers in different LATAs. Major
  • 19. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 19 companies providing inter-LATA services include AT&TMCI, WorldCom, Sprint, Verizon etc. The IXCs are long-distance carriers that provide general data communications services including telephone service. A telephone call going through an IXC is normally digitized, with the carriers using several types of networks to provide service. Each IXC that wants to provide inter LATA services .in a LATA must have a POP in that LATA. The LECs that provide services inside the LATA must provide connections so that every subscriber can have access to all POPs. Points of Presence (POP): Point of presence (POP) connects several LECs and IXCs. 3. Signaling: It is used for information exchange concerning the establishment and control of a telecommunication circuit & the management of the network, in contrast to user information transfer. The signaling system was required to perform other tasks such as  Providing dial tone, ring tone, and busy tone.  Transferring telephone numbers between offices.  Maintaining and monitoring the call.  Keeping billing information.  Maintaining and monitoring the status of the telephone network equipment.  Providing other functions such as caller ID, voice mail, and so on.  In modern telephone networks the tasks of data transfer and signaling are separated: Data transfer is done by one network, signaling by another, which is shown in figure 1.25 Figure1.25 Data transfer and signaling networks
  • 20. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 20 4. Signaling System Seven (SS7) *** SS7 is a global standard for telecommunications defined by the ITU. The protocol that is used in the signaling network is called Signaling System Seven (SS7).The standard defines the procedures and protocol by which network elements in PSTN exchange information over a digital signaling network to effect wireless (cellular) and wire line call setup, routing and control. The SS7 network and protocol are used for:  Basic call setup, management and tear down.  Wireless services such as personal communications services (PCS), wireless roaming, and mobile subscriber authentication.  Local Number Portability (LNP).  Toll-free (800/888) and toll (900) wireline services.  Enhanced call features such as call forwarding, calling party name/number display, and three-way calling.  Efficient and secure worldwide telecommunications. Layers of SS7: It is very similar to the five-layer Internet model, but the layers have different names as shown 1.26 Figure 1.26 Layers in SS7 1. Physical Layer: MTP Level 1 The physical layer in SS7 called message transport part (MTP) level I uses several physical layer specifications such as T-l (1.544 Mbps) and DCa (64 kbps). 2. Data Link Layer: MTP Level 2 the MTP level 2 layers provides typical data link layer services such as packetizing, using source and destination address in the packet header, and CRC for error checking.
  • 21. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 21 3. Network Layer: MTP Level 3 The MTP level 3 layer provides end-to-end connectivity by using the datagram approach to switching. Routers and switches route the signal packets from the source to the destination. 4. Transport Layer: SCCP The signaling connection control point (SCCP) is used for special services such as SaO-call processing. 5. Upper Layers: TUP, TCAP, and ISUP are three protocols at the upper layers. a. Telephone user port (TUP) is responsible for setting up voice calls. It receives the dialed digits and routes the calls. b. Transaction capabilities application port (TCAP) provides remote calls that let an application program on a computer invoke a procedure on another computer. c. ISDN user port (ISUP) can replace TUP to provide services similar to those of an ISDN n/w 5. Services Provided by Telephone Networks: *** Telephone companies provide two types of services: Analog and Digital. 1. Analog Services:  Analog Switched Services  800 service  Wide-area telephone service (WATS).  900 services  Analog Leased Service 2. Digital Services:  Switched/56 service.  Digital data service (DDS). 6. Dial Up Modems: Traditional telephone lines can carry frequencies between 300 and 3300 Hz of BW 3000 Hz. This range is used for transmitting voice. The effective bandwidth of a telephone line being used for data transmission is 2400 Hz, covering the range from 600 to 3000 Hz, shown in figure 1.27 Figure 1.27 Telephone line bandwidth
  • 22. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 22 MODEM: It is a device: a signal modulator and a signal demodulator. A modulator creates a band pass analog signal from binary data. A demodulator recovers the binary data from the modulated signal. . Figure 1.28 Modulation/demodulation 7. Modem Standards *** Most popular modems available are based on the V-series standards published by the ITU-T V.32 modem:  It uses a combined modulation and encoding technique called trellis-coded modulation.  The V.32 calls for 32-QAM with a baud rate of 2400.  Uses 4 bits of each symbol represent data; then total data rate is 4 x 2400 = 9600 bps. V.32bis Modem:  It was the first of the ITU-T standards to support 14,400-bps transmission.  It uses 128-QAM transmission (7 bits/baud with I bit for error control) at a rate of 2400 baud (2400 x 6 = 14,400 bps.) V.34bis Modem:  It provides a bit rate of 28,800 with a 960-point constellation  Bit rate of 33,600 bps with a 1664-point constellation V.90 Modem  V.90 modems with a bit rate of 56,000 bps. Also called 56K modems.  These modems may be used only if one party is using digital signaling  They are asymmetric in that the downloading rate is a maximum of 56 kbps, while the uploading rate can be a maximum of 33.6 kbps. V.92 Modem  The standard above V90 is called V.92.  These modems can adjust their speed, and if the noise allows, they can upload data at the rate of 48 kbps. The downloading rate is still 56 kbps.
  • 23. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 23  The modem has additional features. For example, the modem can interrupt the Internet connection when there is an incoming call if the line has call-waiting service. Figure 1.29 Uploading and downloading in 56K modems 1.7. DIGITAL SUBSCRIBER LINE (DSL) *** It supports high- speed digital communication over the existing local loops. After traditional modems reached their peak data rate, telephone companies developed another technology, DSL, to provide higher-speed access to the Internet. DSL technology is a set of technologies, i.e 1. Asymmetric Digital Subscriber Line (ADSL) 2. Very High-bit-rate Digital Subscriber Line (VDSL) 3. High-bit-rate Digital Subscriber Line (HDSL) 4. Symmetric Digital Subscriber Line (SDSL). 1. ADSL (Asymmetric Digital Subscriber Line): It is like a 56K modem, provides higher speed in the downstream direction than in the upstream direction. That is the reason it is called ‘asymmetric’. ADSL specifically divided the available bandwidth of the local loop unevenly for the residential customer. The service is not suitable for business customers who need a large bandwidth in both directions. But how does ADSL reach a data rate that was never achieved with traditional modems?
  • 24. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 24 The existing local loops can handle bandwidths up to 1.1 MHz the entire 1.1 MHz is available for data and voice communications. ADSL is an adaptive technology. The system uses a data rate based on the condition of the local loop line. 1.1 Discrete Multitone Technique (DMT): The modulation technique that has become standard for ADSL is called the Discrete Multitone Technique (DMT) which combines QAM and FDM. Figure 1.30 Discrete multitone technique There is no set way that the bandwidth of a system is divided. Each system can decide on its bandwidth division. Figure 1.31: Bandwidth division in ADSL Figure 1.31: Bandwidth division in ADSL Typically, an available bandwidth of 1.104 MHz is divided into 256 channels. Each channel uses a bandwidth of 4.312 kHz. The fig 1.30 shows how bandwidth can be divided into the following:  Voice: Channel 0 is reserved for voice communication.  Idle: Channels 1 to 5 are not used and provide a gap between voice and data communication.  Upstream data and control: Channels 6 to 30 (25 channels) are used for upstream data transfer (24 channels) and 1 control. If there are 24 channels, each using 4 kHz (out of 4.312
  • 25. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 25 kHz available) with QAM modulation. Upstream Data rate 24 x 4000 x 15, or a 1.44-Mbps.But the data rate is normally below 500 kbps because some of the carriers are deleted at frequencies where the noise level is large.  Downstream data and control: Channels 31 to 255 (225 channels) are used for downstream data transfer and control. One channel is for control, and 224 channels are for data. If there are 224 channels, then the data rate up to 224 x 4000 x 15, or13.4 Mbps. But in practice data rate is normally below 8 Mbps, due to high noise in the some channel. 1.2 ADSL Implementation: 1. Customer Site: ADSL Modem (down link) ADSL modem is located in customer site, like home or office buildings. This is shown in figure 1.32 Figure 1.32: ADSL modem ADSL modem installed at a customer's site. The local loop connects to a splitter which separates voice and data communications. The ADSL modem modulates and demodulates the data, using DMT, and creates downstream and upstream channels. 1.3 Telephone Company Site: DSLAM (uplink): Figure 1.33: DSLAM At the telephone company site, Instead of an ADSL modem, a device called a digital subscriber line access multiplexer (DSLAM) is installed; it packetizes the data to be sent to the Internet.
  • 26. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 26 1.4 ADSL Lite:  It is a splitter less ADSL, since the installation of splitters at the border of the user premises expensive and impractical.  This technology allows an ASDL Lite modem to be plugged directly into a telephone jack and connected to the computer.  The splitting is done at the telephone company. It uses 256 DMT carriers with 8-bit modulation.  It can provide a maximum downstream data rate of 1.5 Mbps and an upstream data rate of 512 kbps. 3. High-bit-rate Digital Subscriber Line (HDSL)  It was designed as an alternative to the T-1 line.  HDSL uses 2B1Q encoding which is less susceptible to attenuation.  A data rate of 1.544 Mbps can be achieved without repeaters up to a distance of 12,000 ft (3.86 km).  HDSL uses two twisted pairs (one pair for each direction) to achieve full-duplex transmission. 4. Symmetric Digital Subscriber Line (SDSL).  The symmetric digital subscriber line (SDSL) is a one twisted-pair version of HDSL.  It provides full-duplex symmetric communication supporting up to 768 kbps in each direction.  Although this feature meets the needs of most residential subscribers, it is not suitable for residential subscribers that send and receive data in large volumes in both directions. Table below shows a summary of DSL technologies: Note: Two-binary, one-quaternary (2B1Q)
  • 27. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 27 1.8 CABLE TV NETWORKS: The cable TV network started as a video service provider, but it has moved to the business of Internet access. Two types 1. Traditional Cable Networks 2. Hybrid Fiber-Coaxial (HFC) Network 1. Traditional Cable Networks: It was called community antenna TV (CATV) because an antenna at the top of a tall hill or building received the signals from the TV stations and distributed them, via coaxial cables, to the community. Figure 1.34 shows a schematic diagram of a traditional cable TV network. Communication in the traditional cable TV network is unidirectional Figure 1.34 Traditional cable TV networks 2. Hybride Fibre-Coaxial (HFC) Network : It is a second generation of cable networks. Figure 1.35 Hybrid fiber-coaxial (HFC) network The network uses a combination of fiber-optic and coaxial cable. The transmission medium from the cable TV office to a box, called the fiber node, is optical fiber; from the fiber node through the neighborhood and into the house is still coaxial cable. Figure 1.35 shows a schematic diagram of an HFC network. The Regional Cable Head (RCH) normally serves up to 400,000
  • 28. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 28 subscribers. The RCHs feed the distribution hubs, each of which serves up to 40,000 subscribers. Modulation and distribution of signals are done in the distribution hub; the signals are then fed to the fiber nodes through fiber-optic cables. The fiber node splits the analog signals so that the same signal is sent to each coaxial cable. Each coaxial cable serves up to 1000 subscribers. The use of fiber-optic cable reduces the need for amplifiers down to eight or less. Communication in an HFC cable TV network can be bidirectional. 1.8.1 Cable TV for Data Transfer: Cable companies are now competing with telephone compa - nies for the residential customer who wants high-speed data transfer. This section deals with 1. Bandwidth 2. Sharing. 3. CM and CMTS 4. Data Transmission Schemes: Data Over Cable System Interface Specification (DOCSIS). 1. Bandwidth: The coaxial cable has a bandwidth that ranges from 5 to750 MHz (approx). To provide Internet access, the cable company has divided this bandwidth into three bands: 1. Video 2. Downstream data 3. Upstream data bands. Shown in fig 1.36 Figure 1.36: Division of coaxial cable band by CATV Downstream Video Band:  It occupies frequencies from 54 to 550 MHz.  Each TV channel occupies 6 MHz; this can accommodate more than 80 channels. Downstream Data Band  It occupies the upper band, from 550 to 750 MHz  This band is also divided into 6-MHz channels.  Modulation Downstream data band uses the 64-QAM modulation technique.  The theoretical downstream data rate is 30 Mbps.
  • 29. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 29 Upstream Data Band:  It occupies the lower band, from 5 to 42 MHz  This band is also divided into 6-MHz channels.  Upstream data are modulated using the QPSK modulation technique due to high noise.  Data Rate is 12 Mbps, upstream data can be sent at (2 bits/Hz x 6 MHz). 2. Sharing: Both upstream and downstream bands are shared by the subscribers. Upstream Sharing: The upstream data bandwidth is 37 MHz. Only six 6-MHz channels available in the upstream direction. A subscriber needs to use one channel to send data in the upstream direction. The question is, "How can six channels be shared in an area with 1000, 2000, or even100, 000 subscribers?" The solution is timesharing. Downstream Sharing: The downstream band has 33 channels of 6 MHz. A cable provider probably has more than 33 subscribers; therefore, each channel must be shared between a group of subscribers 3. CM and CMTS:*** To use a cable network for data transmission, need two key devices: 1. Cable Modem(CM) 2. Cable Modem Transmission System (CMTS). 1. The cable modem (CM): It is installed on the subscriber premises. It is similar to an ADSL modem, as shown in figure 1.37. Figure 1.37 Cable modem (CM) 2. Cable Modem Transmission System (CMTS): The cable modem transmission system (CMTS) is installed inside the distribution hub by the cable company. It receives data from the Internet and passes them to the combiner, which sends them to the subscriber. The CMTS also receives
  • 30. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 30 data from the subscriber and passes them to the Internet. Figure 1.38 shows the location of the CMTS. Figure 1.38 Cable modem transmission system (CMTS) 4. Data Transmission Schemes: DOCSIS: Multimedia Cable Network Systems (MCNS) designed to create a standard for data transmission over an HFC network called “Data Over Cable System Interface Specification “(DOCSIS). DOCSIS defines all the protocols need to transport data from a CMTS to a CM. Upstream Communication: The following is a very simplified version of the protocol defined by DOCSIS for upstream communication. It describes the steps that must be followed by a CM: 1. The CM checks the downstream channels for a specific packet periodically sent by the CMTS. 2. The packet asks any new CM to announce itself on a specific upstream channel. 3. The CMTS sends a packet to the CM, defining its allocated downstream and upstream channels. 4. The CM then starts a process, called ranging, which determines the distance between the CM and CMTS. This process is required for synchronization between all CMs and CMTSs for the minislots used for timesharing of the upstream channels. 5. The CM sends a packet to the ISP, asking for the Internet address. 6. The CM and CMTS then exchange some packets to establish security parameters, which are needed for a public network such as cable TV. 7. The CM sends its unique identifier to the CMTS. 8. Upstream communication can start in the allocated upstream channel; the CM can contend for the mini-slots to send data. Downstream Communication: In the downstream direction, the communication is much simpler. There is no contention because there is only one sender. The CMTS sends the packet with the address of the receiving CM, using the allocated downstream channel.
  • 31. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 31 SUMMARY OF UNIT ONE: NETWORK MODELS  The ISO created a model called the OSI, which allows diverse systems to communicate.  The seven-layer OSI model provides guidelines for the development of universally compatible networking protocols.  The physical, data link, and network layers are the network support layers.  The session, presentation, and application layers are the user support layers.  The transport layer links the network support layers and the user support layers.  The physical layer coordinates the functions required to transmit a bit stream over a physical medium.  The data link layer is responsible for delivering data units from one station to the next without errors.  The network layer is responsible for the source-to-destination delivery of a packet across multiple network links.  The transport layer is responsible for the process-to-process delivery of the entire message.  The session layer establishes, maintains, and synchronizes the interactions between communicating devices.  The presentation layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format.  The application layer enables the users to access the network.  TCP/IP is a five-layer hierarchical protocol suite developed before the OSI model.  The TCP/IP application layer is equivalent to the combined session, presentation, and application layers of the OSI model.  Four levels of addresses are used in an internet following the TCP/IP protocols: physical (link) addresses, logical (IP) addresses, port addresses, and specific addresses.  The physical address, or link address, is the address of a node as defined by its LAN or WAN.  The IP address uniquely defines a host on the Internet.  The port address identifies a process on a host.  Specific address is a user-friendly address.  The telephone, which is referred to as the plain old telephone system (POTS), was originally an analog system. During the last decade, the telephone network has undergone many technical changes. The network is now digital as well as analog.  The telephone network is made of three major components: local loops, trunks, and switching offices.  It has several levels of switching offices such as end offices, tandem offices, and regional offices.
  • 32. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 32  The Telephone service called LATAs. The services offered inside a LATA are called intra-LATA services. The carrier that handles these services is called a local exchange carrier (LEC).  In in-band signaling, the same circuit is used for both signaling and data.  In out-of- band signaling, a portion of the bandwidth is used for signaling and another portion for data.  The protocol that is used for signaling in the telephone network is called Signaling System Seven (SS7).  Telephone companies provide two types of services: analog and digital. We can categorize analog services as either analog switched services or analog leased services.  The two most common digital services are switched/56 service and digital data Service (DDS).  Data transfer using the telephone local loop was traditionally done using a dial-up modem.  The term modem is a composite word that refers to: a signal modulator and a signal demodulator.  Most popular modems available are based on the V-series standards. The V.32 modem has a data rate of 9600 bps. The V32bis modem supports 14,400-bps transmission.  V90 modems, called 56K modems, with a downloading rate of 56 kbps and uploading rate of 33.6 kbps are very common. The standard above V90 is called V92.  These modems can adjust their speed, and if the noise allows, they can upload data rate of 48 kbps.  Telephone companies developed another technology, digital subscriber line (DSL), to provide higher-speed access to the Internet. DSL technology is a set of technologies, each differing in the first letter (ADSL, VDSL, HDSL, and SDSL. ADSL provides higher speed in the downstream direction than in the upstream direction  The high-bit rate digital subscriber line (HDSL) was designed as an alternative to the T-l line (1.544 Mbps). The symmetric digital subscriber line (SDSL) is a one twisted- pair version of HDSL.  The very high-bit-rate digital subscriber line (VDSL) is an alternative approach that is similar to ADSL.  Community antenna TV (CATV) was originally designed to provide video services for the community. The traditional cable TV system used coaxial cable end to end.  The second generation of cable networks is called a hybrid fiber-coaxial (HFC) n/w. The network uses a combination of fiber-optic and coaxial cable.  Cable companies are now competing with telephone companies for the residential Customer who wants high-speed access to the Internet.  To use a cable network for data transmission, we need two key devices: a cable modem (CM) and a cable modem transmission system (CMTS).
  • 33. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 33 UNIT -1 NETWORK MODEL QUESTION BANK 1. List the layers of the Internet model. 2. Which layers in the Internet model are the network support layers? 3. Which layer in the Internet model is the user support layer? 4. What is the difference between network layer delivery and transport layer delivery? 5. What is a peer-to-peer process? 6. How does information get passed from one layer to the next in the Internet model? 7. What are headers and trailers, and how do they get added and removed? 8. What are the concerns of the physical layer in the Internet model? 9. What are the responsibilities of the data link layer in the Internet model? 10. What are the responsibilities of the network layer in the Internet model? 11. What are the responsibilities of the transport layer in the Internet model? 12. What is the difference between a port address, a logical address, and a physical address? 13. Name some services provided by the application layer in the Internet model. 14. How do the layers of the Internet model correlate to the layers of the OSI model? 15. How are OSI and ISO related to each other? 16. Match the following to one or more layers of the OSI model: a. Route determination b. Flow control c. Interface to transmission media d. Provides access for the end user 17. Match the following to one or more layers of the OSI model: a. Reliable process-to-process message delivery b. Route selection c. Defines frames d. Provides user services such as e-mail and file transfer e. Transmission of bit stream across physical medium 18. Match the following to one or more layers of the OSl model: a. Communicates directly with user's application program b. Error correction and retransmission c. Mechanical, electrical, and functional interface d. Responsibility for carrying frames between adjacent nodes
  • 34. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 34 19. Match the following to one or more layers of the OSI model: a. Format and code conversion services b. Establishes, manages, and terminates sessions c. Ensures reliable transmission of data d. Log-in and log-out procedures e. Provides independence from differences in data representation 20. What are the three major components of a telephone network? 21. Give some hierarchical switching levels of a telephone network. 22. What is LATA? What are intra-LATA and inter-LATA services? 23. Describe the SS7 service and its relation to the telephone network. 24. What are the two major services provided by telephone companies in the United States? 25. What is dial-up modem technology? List some of the common modem standards and their data rates. 26. What is DSL technology? What are the services provided by the telephone companies using DSL? Distinguish between a DSL modem and a DSLAM. 27. Compare and contrast a traditional cable network with a hybrid fiber-coaxial network. 28. How data transfer is achieved using CATV channels? 29. Distinguish between CM and CMTS. 30. Why circuit-switching was chosen for telephone networks? 31. Define end-to-end addressing in a telephone network when two parties communicate. 32. When we have an overseas telephone conversation, we sometimes experience a delay. Give the reason? 33. Draw a bar chart to compare the different downloading data rates of common modems. 34. Draw a bar chart to compare the different downloading data rates of common DSL technology implementations (use minimum data rates). 35. Calculate the minimum time required to download one million bytes of information using each of the following technologies: a. V32 modem b. V32bis modem c. V90 modem 36. Repeat Exercise 17 using different DSL implementations (consider the minimum rates). 37. Repeat Exercise 17 using a cable modem (consider the minimum rates). 38. What type of topology is used when customers in an area use DSL modems for data transfer purposes? Explain.
  • 35. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 35 UNIT 1- NETWORK MODEL- SOLVED EXAMPLES 1. Match the following to one or more layers of the OSI model: a. Route determination – Network Layer b. Flow control- Data Link Layer c. Interface to transmission media- Physical Layer d. Provides access for the end user- Application layer 2. Match the following to one or more layers of the OSI model: a. Reliable process-to-process message delivery – Transport Layer b. Route selection - Network Layer c. Defines frames - Data Link Layer d. Provides user services such as e-mail and file transfer- Application layer e. Transmission of bit stream across physical medium - Physical Layer 3. Match the following to one or more layers of the OSl model: a. Communicates directly with user's application program- Transport Layer b. Error correction and retransmission - Transport Layer c. Mechanical, electrical, and functional interface - Physical Layer d. Responsibility for carrying frames between adjacent nodes - Data Link Layer 4. Match the following to one or more layers of the OSI model: a. Format and code conversion services - Presentation Layer b. Establishes, manages, and terminates sessions – session layer c. Ensures reliable transmission of data - Data link and transport layers d. Log-in and log-out procedures - session layer e. Provides independence from differences in data representation - Presentation Layer 5. Calculate the minimum time required to download one million bytes of information using each of the following technologies: a. V32 modem b. V32bis modem c. V90 modem d. ADSL modem e. Cable modem
  • 36. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 36 Solution: (a). V.32 modem :  It has data rate of 9600bps  Minimum time required to down load = Data size / data rate = (10, 00, 000 / 9600) Χ 8 = 834 seconds = 13 min 54 sec (b). V.32 bis modem :  It has data rate of 14,400 bps  Minimum time required to down load = Data size / data rate = (10, 00, 000 / 14,400) Χ 8 = 556 seconds = 9 min 16 sec (b). V.90 modem :  It has data rate of 56,000 bps  Minimum time required to down load = Data size / data rate = (10, 00, 000 / 56,000) Χ 8 = 143 seconds = 2 min 23 sec (b). ADSL modem :  It has data rate of 13.4 Mbps  Minimum time required to down load = Data size / data rate = (10, 00, 000 / 13.4 Χ 106 ) Χ 8 = 0.596 seconds (b). Cable TV modem :  It has data rate of 30 Mbps  Minimum time required to down load = Data size / data rate = (10, 00, 000 / 30 Χ 106 ) Χ 8 = 0.266 seconds
  • 37. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 37 UNIT 1- NETWORK MODEL UNIVERSITY QUESTIONS AND ANSWER 1 a. Show the layer representation in the TCP/IP model and the OSI model and explain. (Dec 09/ Jan 10 – 10marks –Answer refer page no. 2 and 11) b. Give a brief overview of SS7 signaling. (Dec 09/ Jan 10 – 05marks –Ans refer page no.18) c. Match the following functions to the appropriate layers in the OSI model. (Dec 09/ Jan 10 – 05marks) I. Dividing the transmitted bit stream into frames: Answer- Data Link Layer II. Determining the route to be used through the subnet: Answer- Network Layer III. Reliable process to process message delivery: Answer- Transport Layer IV. Format and code conversion services: Answer- Presentation Layer V. Accessing the World Wide Web: Answer- Application Layer 2 a. Explain OSI model, with a neat diagram. Consider a source, destination machine and some intermediate nodes for discussion.(May/ June 10 – 10marks –Ans refer page no.3 to 5) b. How addresses employed (used) in internet employing TCP/IP protocol can be classified? (May/ June 10 – 02 marks –Answer refer page no.13 to 15) c. What is DSL technology? List different DSL’s available. Discuss salient feature of ASDL. (May/ June 10 – 08marks –Answer refer page no.22 and 23) 3 a. What are the levels of addresses that are used in internet, employing the TCP/IP protocols? (December 10 – 10marks –Answer refer page no.13 to 15) b. What are different types of services provided by telephone networks? (December 10 – 06marks –Answer refer page no.20) c. Name the major components of a telephone network. (December 10 – 04marks –Answer refer page no.16) 4 a. With a neat diagram, explain the TCP/IP reference model, giving a brief description of the protocols in each layer (June/July 2011 – 10marks –Answer refer page no.11) b. Differentiate between CM and CMTS. (June/July 2011 – 04marks –Ans refer page no.28) c. Explain the operation of ADSL using discreet multi one modulations indicating the different channels, with a neat diagram. (June/July 2011 – 06marks –Answer refer page no.22 &23)
  • 38. Computer Communication Network: Unit 1- Network Mode Prof. Suresha V, Dept. Of E&C E. K V G C E, Sullia, D.K-574 327 Page 38 5 a. Explain the difference between OSI reference model and TCP/IP reference model (December 2011 – 05marks –Answer refer page no.13) b. Match the following to one or more layers in OSI model: (December 2011 – 05marks) i. Route determination: Answer- Network Layer ii. Flow control: Answer- Transport Layer iii. Interface to transmission media: Answer- Physical Layer iv. Provides access for end user: Answer- Application Layer v. Format and code conversion services: Answer- Presentation Layer c. What is DSL technology? What are the services provided by the telephone companies using DSL? Distinguish between DSL and DSLAM (December 2011 – 10marks –Answer refer page no.22 and 23) 6. a. Describe the ISO OSI reference model of a computer network. Discuss the function of Each layer. (December 2012 – 10 marks –Answer refer page no.2 and 5) b. Describe the SS7 service and its relation to the telephone network. (December 2012 – 05marks –Answer refer page no.19 and 20) c. Distinguish between a DSL modem and a DSLAM. December 2012 – 05marks –Answer refer page no.22) 7.(a) Explain briefly with relevant examples, the 4 levels of address that are used in an internet employing the TCP/IP Protocols.( June/July 2013 – 10marks –Ans refer page no. 13) (b). Briefly describe the function of physical layer and data link layer ( June /July 2013 – 06 marks –Answer refer page no.5 and 6 ) (c).Explain the operation of ADSL using Discrete Multitone Technique indicating the different channels with diagram.( June/July 2013 – 04 marks –Answer refer page no.24 )