Professional Documents
Culture Documents
UNIT-1 CN Notes
UNIT-1 CN Notes
UNIT-1 CN Notes
INTRODUCTION
Data communications refers to the transmission of digital data between two or more
computers and a computer network or data network is a telecommunications network that
allows computers to exchange data. The physical connection between networked computing
devices is established using either cable media or wireless media. The best-known computer
network is the Internet.
The communication system that consists of the interconnection between two or more
devices is referred to as a Network. A network is a set of devices (often referred to as nodes)
connected by communication links. A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by other nodes on the network.
2. Sender: The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver:The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
1. File sharing
The major advantage of a computer network is that is allows file sharing and
remote file access. A person sitting at one workstation that is connected to a network can
easily see files present on another workstation, provided he is authorized to do so.
2. Resource sharing
All computers in the network can share resources such as printers, fax machines,
modems, and scanners.
4. Internet access
Computer networks provide internet service over the entire network. Every single
computer attached to thenetwork can experience the high speed internet.
5. Entertainment
Many games and other means of entertainment are easily available on the internet.
Furthermore, Local Area Networks (LANs) offers and facilitates other ways of
enjoyments, such as many players are connected through LAN and play a particular game
with each other from remote location.
6. Inexpensive system
Shared resources mean reduction in hardware costs. Shared files mean reduction
in memory requirement, which indirectly means reduction in file storage expenses. A
particular software can be installed only once on the server and made available across all
connected computers at once. This saves the expense of buying and installing the same
software as many times for as many users.
7. Flexible access
A user can log on to a computer anywhere on the network and access his files.
This offers flexibility to the user as to where he should be during the course of his routine.
3. Lack of Independence
Since most networks have a centralized server and dependent clients, the client
users lack any freedom whatsoever. Centralized decision making can sometimes hinder
how a client user wants to use his own computer.
4. Lack of Robustness
As previously stated, if a computer network’s main server breaks down, the entire
system would become useless. Also, if it has a bridging device or a central linking server
that fails, the entire network would also come to a standstill.
1. Resource Sharing—The most frequently used shared network environment objects are
files, data, multimedia and hardware resources like printers, fax machines and scanners.
4. For Back-up and Support: Networked computers can be used to take back-up of critical
data. In situations where there is a requirement of always-on computer, another computer on
the network can take over in case of failure of one computer.
In short, the ability to merge information, communication and entertainment will surely give
rise to a massive new industry based on computer networking.
8. Retrieving Remote Information: Through computer networks, users can retrieve remote
information on a variety of topics. The information is stored in remote databases to which the
user gains access through information systems like the World Wide Web.
Peer-To-Peer Architecture
Client/Server Architecture
• Client-server architecture, architecture of a computer network in which many clients
(remote processors) request and receive service from a centralized server (host computer).
• In a client/server network, a centralized, really powerful computer(server) act as a hub in
which other computers or workstations(clients) can connect to. This server is the heart of the
system, which manages and provides resources to any client that requests them.
• A server performs all the major operations such as security and network management.
• A server is responsible for managing all the resources such as files, directories, printer, etc.
• All the clients communicate with each other through a server. For example, if client1 wants
to send some data to client 2, then it first sends the request to the server for the permission.
The server sends the response to the client 1 to initiate its communication with the client 2.
The term topology refers to the way in which a network is laid out physically.
Two or more devices connect to a link; two or more links form a topology. The
topology of a network is the geometric representation of the relationship of all the
links and linking devices (usually called nodes) to one another.
There are four basic topologies possible: “Mesh, Star, Bus and Ring”
1. MESH:
A mesh topology is the one where every node is connected to every other node in the
network. A mesh topology can be a full mesh topology or a partially connected
mesh topology.
In a full mesh topology, every computer in the network has a connection to
each of the other computers in that network.
The number of connections in this network can be calculated using the
following formula (n is the number of computers in the network) :n(n-1)/2
In a partially connected mesh topology, at least two of the computers in the
network have connections to multiple other computers in that network. It is
aninexpensivewaytoimplementredundancyinanetwork.Intheeventthatoneof the
primary computers or connections in the network fails, the rest of the network
continues to operate normally.
1. Can handle high amounts of traffic, because multiple devices can transmit
data simultaneously.
2. A failure of one device does not cause a break in the network or
transmission of data.
3. Adding additional devices does not disrupt data transmission between
other devices.
Disadvantages of a mesh topology
2. STAR:
A star network, star topology is one of the most common network
setups. In this configuration, every node connects to a central network device,
like a hub, switch, or computer. The central network device acts as a server
and the peripheral devices act as clients. Depending on the type of network
card used in each computer of the star topology, a coaxial cable or a RJ-45
1. Can have a higher cost to implement, especially when using a switch or router
as the central network device.
2. The central network device determines the performance and number of nodes
the network can handle.
3. If the central computer, hub, or switch fails, the entire network goes down and
all computers are disconnected from the network.
3. BUS:
A line topology, a bus topology is a network set up in which each
computer and network device are connected to a single cable or
backbone
1. It can be difficult to identify the problems if the whole network goes down.
2. It can be hard to trouble shoot individual device issues.
3. Bus topology is not great for large networks.
4. Terminators are required for both ends of the main cable.
5. Additional devices slow the network down.
6. If a main cable is damaged, the network fails or splits into two.
4. RING:
5. Hybrid Topology
A network can be hybrid. Hybrid topologies combine two or more different topology
structures—the tree topology is a good example, integrating the bus and star layouts.
Hybrid structures are most commonly found in larger companies where individual
departments have personalized network topologies adapted to suit their needs and network
usage.
For example, we can have a main star topology with each branch consisting several stations
in a bus topology as shown below.
Disadvantages:
1. A network grows in complexity, so too does the experience and know-how required
on the part of the admins to keep everything functioning optimally.
2. There’s also the monetary cost to consider when creating a hybrid network topology.
6. Tree Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also
called hierarchical topology. It should at least have three levels to the hierarchy. In this
topology, the various secondary hubs are connected to the central hub which contains the
repeater. The data flows from top to bottom i.e., from the central hub to secondary and then
to the devices or from bottom to top i.e., devices to secondary hub and then to the central hub.
Advantages of Tree topology
1. It allows more devices to be attached to a single central hub thus it increases the
distance that is travel by the signal to come to the devices.
2. It allows the network to get isolate and also prioritize from different computers.
Disadvantages:
1. If the central hub gets fails the entire system fails.
2. The cost is high because of cabling
Types of network:
LANs are restricted in size, which means that the worst-case transmission time is
bounded and known in advance. Knowing this bound makes it possible to use certain kinds of
designs that would not otherwise be possible.
It also simplifies network management. Traditional LANs run at speeds of 10 Mbps
to 100 Mbps, have low delay (microseconds or nanoseconds), and make very few errors.
Newer LANs operate at up to 10 Gbps.
Characteristics of LAN:
• LANs are private networks, not subject to external control
• Simple and better performance
• Work in a restricted geographical area
Advantages:
• Resource sharing
• Software applications sharing
• Easy and Cheap communication
• Data Security
• Internet sharing
Disadvantages
• Restricted to local area
A MAN is a network with a size b/n a LAN and a WAN. It normally covers
the area inside a town or a city. It designed for customers who need high speed
connectivity normally to the internet and have end point spread over a city or part of the
city. A good example of a MAN is the part of the telephone company network that can
provide high speed DSL line to costumer. Another example is the cable TV network that
originally designed for cable TV. But today can also be used for high speed data
connection to the internet.
Characteristics:
• Generally, covers towns and cities (up to 50km)
• Transmission medium used for MAN is optical fiber, coaxial cable etc.
• Data rates adequate for distributed computing applications
Advantages
• Extremely efficient and provide fast communication via high-speed carriers, such as fiber
optic cables
• Good backbone for larger networks and provides greater access to WAN
Disadvantages
• Complex, more cabling required and expensive
A WAN provide long distance transmission of data, image, audio, and video.
Information over large geographic areas that may comprise a country or a continent or
even the whole world. A WAN can be complex as the backbones that connect the internet
or simple as dialup line that connect whole computer to the internet. We normally refers
to the first as a switched WAN and to the second as point-to-point WAN. The switched
WNA connects end system which usually compress a router [Internet working connecting
device] that connects to another LAN or WAN.
Characteristics:
• Covers large distances (states, countries, continents)
• Communication medium used are satellite, public telephone networks which are
connected by routers
Advantages
• Covers large geographical area
• Shared software and resources with connecting workstations
• Information can be exchanged to anyone else worldwide in the network
Disadvantages
• Data security
• Network is very complex and management is difficult
• As size increases, the networks become more expensive
OSI Reference model
➢ OSI stands for Open System Interconnection is a reference model that describes
how information from a software application in one computer moves through a
physical medium to the software application in another computer.
➢ OSI consists of seven layers, and each layer performs a particular network function.
➢ OSI model was developed by the International Organization for Standardization (ISO)
in 1984, and it is now considered as an architectural model for the inter-computer
communications.
➢ OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
➢ Each layer is self-contained, so that task assigned to each layer can be performed
independently.
➢ The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems.
1. Physical Layer:
o The main functionality of the physical layer is to transmit the individual bits from one
node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.
Functions of a Physical layer:
o Line Configuration: It defines the way how two or more devices can be connected
physically.
o Data Transmission: It defines the transmission mode whether it is simplex, half-
duplex or full-duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the information.
o Framing: The data link layer translates the physical's raw bit stream into packets
known as Frames. The Data link layer adds the header and trailer to the frame. The
header which is added to the frame contains the hardware destination and source
address.
o Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in
the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that
no data get corrupted. It ensures that the transmitting station such as a server with
higher processing speed does not exceed the receiving station, with lower processing
speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occurr, then
the receiver sends the acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to determine
which device has control over the link at a given time.
3. Network Layer:
o It is a layer 3 that manages device addressing, tracks the location of devices on the
network.
o It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide the
routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.
4. Transport Layer:
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order in
which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known
as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
5. Session Layer:
o The Session layer is used to establish, maintain and synchronizes the interaction
between communicating devices.
o Dialog control: Session layer acts as a dialog controller that creates a dialog between
two processes or we can say that it allows the communication between two processes
which can be either half-duplex or full-duplex.
o Synchronization: Session layer adds some checkpoints when transmitting the data in
a sequence. If some error occurs in the middle of the transmission of data, then the
transmission will take place again from the checkpoint. This process is known as
Synchronization and recovery.
6. Presentation Layer:
o A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
o The Presentation layer is also known as the syntax layer.
o Translation: The processes in two systems exchange the information in the form of
character strings, numbers and so on. Different computers use different encoding
methods, the presentation layer handles the interoperability between the different
encoding methods. It converts the data from sender-dependent format into a common
format and changes the common format into receiver-dependent format at the
receiving end.
o Encryption: Encryption is needed to maintain privacy. Encryption is a process of
converting the sender-transmitted information into another form and sends the
resulting message over the network.
o Compression: Data compression is a process of compressing the data, i.e., it reduces
the number of bits to be transmitted. Data compression is very important in
multimedia such as text, audio, video.
7. Application Layer:
o An application layer serves as a window for users and application processes to access
network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer
functions.
o This layer provides the network services to the end-users.
o File transfer, access, and management (FTAM): An application layer allows a user
to access the files in a remote computer, to retrieve the files from a computer and to
manage the files in a remote computer.
o lMail services: An application layer provides the facility for email forwarding and
storage.
o Directory services: An application provides the distributed database sources and is
used to provide that global information about various objects.
The TCP/IP reference model:
❖ TCP/IP Model helps you to determine how a specific computer should be connected
to the internet and how data should be transmitted between them.
❖ It helps you to create a virtual network when multiple computer networks are
connected together.
❖ The purpose of TCP/IP model is to allow communication over large distances.
❖ TCP/IP stands for Transmission Control Protocol/ Internet Protocol.
❖ TCP/IP Stack is specifically designed as a model to offer highly reliable and end-to-
end byte stream over an unreliable internetwork.
1. Application Layer
Application layer interacts with an application program, which is the highest level of
OSI model. The application layer is the OSI layer, which is closest to the end-user. It means
the OSI application layer allows users to interact with other software application.
2. Transport Layer
Transport layer builds on the network layer in order to provide data transport from a
process on a source system machine to a process on a destination system. It is hosted using
single or multiple networks, and also maintains the quality of service functions.
It determines how much data should be sent where and at what rate. This layer builds
on the message which are received from the application layer. It helps ensure that data units
are delivered error-free and in sequence.
Transport layer helps you to control the reliability of a link through flow control, error
control, and segmentation or de-segmentation.
The transport layer also offers an acknowledgment of the successful data transmission
and sends the next data in case no errors occurred. TCP is the best-known example of the
transport layer.
Important functions of Transport Layers:
• It divides the message received from the session layer into segments and numbers
them to make a sequence.
• Transport layer makes sure that the message is delivered to the correct process on the
destination machine.
• It also makes sure that the entire message arrives without any error else it should be
retransmitted.
3. Internet Layer
An internet layer is a second layer of TCP/IP layes of the TCP/IP model. It is also
known as a network layer.
The main work of this layer is to send the packets from any network, and any
computer still they reach the destination irrespective of the route they take.
The Internet layer offers the functional and procedural method for transferring
variable length data sequences from one node to another with the help of various networks.
Message delivery at the network layer does not give any guaranteed to be reliable
network layer protocol.
Layer-management protocols that belong to the network layer are:
1. Routing protocols
2. Multicast group management
3. Network-layer address assignment.
The most common UTP connector is RJ45 (RJ stands for registered jack)
Applications:
1. Twisted-pair cables are used in telephone lines to provide voice and datachannels.
2. Local-area networks, such as l0Base-T and l00Base-T, also use twisted-pair
cables.
➢ Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than
those in twisted pair cable. coax has a central core conductor of solid or stranded
wire (usually copper) enclosed in an insulating sheath, which is, in turn, encased
inan outer conductor of metal foil, braid, or a combination of the two.
The outer metallic wrapping serves both as a shield against noise and as the
secondconductor, which completes the circuit.
This outer conductor is also enclosed in an insulating sheath, and the whole
cable is protected by a plastic cover.
Applications
1. Coaxial cable was widely used in analog telephone networks,digital telephone
networks
2. Cable TV networks also use coaxial cables.
3. Another common application of coaxial cable is in traditional Ethernet LANs
➢ Fiber-Optic Cable
Applications
1. Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-
effective.
2. Some cable TV companies use a combination of optical fiber and coaxial cable, thus
creating a hybrid network.
3. Local-area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-X also
use fiber-optic cable.
Unguided Media: Wireless Unguided media transport electromagnetic
waves without using a physical conductor. This type of communication is often
referred to as wireless communication.
Unguided signals can travel from the source to destination in several ways:
ground propagation, sky propagation, and line-of-sight propagation.
➢ Radio Waves
Electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are normally
called radio waves. Radio waves are omni directional. When an antenna transmits radio
waves, they are propagated in all directions.
This means that the sending and receiving antennas do not have to be aligned. A
sending antenna sends waves that can be received by any receiving antenna.
The omni directional property has a disadvantage, too. The radio waves transmitted by
one antenna are susceptible to interference by another antenna that may send signals using the
same frequency or band.
Applications:
1. The Omni directional characteristics of radio waves make them useful for
multicasting, in which there is one sender but many receivers.
2. AM and FM radio, television, maritime radio, cordless phones, and paging
are examples of multicasting.
➢ Micro Waves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves. Microwaves are unidirectional. The sending and receiving antennas need to be
aligned. The unidirectional property has an obvious advantage. A pair of antennas can be
aligned without interfering with another pair of aligned antennas.
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction. Two
types of antennas are used for microwave communications: the parabolic dish and the horn
Applications:
➢ Infrared Waves:
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths
from 1 mm to 770 nm), can be used for short-range communication. Infrared waves,
having high frequencies, cannot penetrate walls.
This advantageous characteristic prevents interference between one system and
another a short- range communication system in one room cannot be affected by another
system in the next room.
When we use our infrared remote control, we do not interfere with the use of the
remote by our neighbors. Infrared signals useless for long-range communication.
In addition, we cannot use infrared waves outside a building because the sun's rays
contain infrared waves that can interfere with the communication.
Applications
In a switched network, some of these nodes are connected to the end systems
(computers or telephones, for example). Others are used only for routing.
A network consists of a set of switches that are connected by the physical links
commonly known as Circuit-Switched Network.
In order to transfer data using Circuit switching there is a need to establish a circuit
(these circuits can either be permanent or temporary) so that data transfer can take place
smoothly. Given below are three phases that are used in Circuit Switching for actual
communication:
• Setup Phase
• Data Transfer Phase
• Teardown Phase
1. Setup Phase
It is the first phase of the Circuit switching technique and in this, there is an
establishment of the circuit that simply means a dedicated link is established between the
sender and the receiver with the help of several switching centers or nodes.
After the establishment of the circuit, the connection is established which means that
data transfer can take place between sender and receiver.
3. Teardown Phase
On the completion of communication between the sender and receiver the circuit
disconnects. In order to disconnect a signal is sent either by the sender or receiver
One of the best examples of Circuit switching is a telephone.
Suppose there are two persons Person A and Person B; they both want to communicate with
each other and located at a distance far from each other.
Person A makes a call to Person B this phase is the setup phase of circuit switching. After
the establishment of the connection and after call pick up by Person B; they both can
communicate with each other. This is the data transfer phase of Circuit switching
Once the communication is complete one of them can cut the call or break the connection.
This is a teardown phase.
2. No Delay in Transmission
There is a dedicated path between sender and receiver thus there are no chances for
the delay.
3. The Circuit Switching technique is best for long transmission because it facilitates a
dedicated link between sender and receiver.
• One of the main disadvantages of Circuit switching is that as there is a dedicated path
between sender and receiver; thus this path is received for these two particular devices
and cannot be used by any other device.
• There is a need for more bandwidth as a dedicated path requires more bandwidth.
• Utilization of resources is not done properly as resources are allocated to a connection
for the entire duration and thus became unavailable for all other connections.
• It becomes inefficient in the case if the connection is established between sender and
receiver but there is no data transfer between them.
• Sometimes it takes a long time to establish the connection between sender and
receiver.
• As there is a dedicated path between sender and receiver; thus, this technique is
expensive.
• Store and Forward: As we have already told you that the sender and the receiver are
not directly connected to each other. Thus intermediate nodes between sender and
receiver are, mainly responsible for transferring the message to the next node in the
path. Thus in order to transfer the message, intermediate nodes must have the storage
capacity because any message will only be delivered if the next node and the link
between them are available to connect otherwise this message will be stored
indefinitely.
A store-and-forward switch thus forwards a message only if sufficient
resources are available and the next node is ready to accept the data. The process
continues till the data is delivered to the destination computer. Hence, it is called
store-&-forward property. The store-and-forward property was earlier used in
telegraph message switching centers.
• Message delivery: In the Message Switching the entire information is compiled into a
single message and then that message is transmitted from source to destination. To
successfully reach its destination each message must contain the routing information
in its header section.
• Every packet contains a header that contains the knowledge of the destination. With
the help of this knowledge/information, these packets find the route.
• A unique number is given to each packet in order to identify them at the receiving
end.
• One of the biggest examples of the Packet-switched network is the Internet.
• The header of the Packet mainly comprises of two things: header and payload.
o where the header mainly contains the routing information.
o and the payload contains the data that is to be transferred.
• This switching is also based on the store and forward method.
• In the Packet Switched network, there is no resource reservation, and resources are
allocated on demand.
• As we know that each packet contains the information of source and destination in
their headers. Thus all packets can independently travel in the network.
• Packets related to the same file might take different paths and it mainly depends upon
the availability of the path. These packets will be then re-assembled at the destination.
It is the responsibility of the receiver node to re-arrange the received packet in order
to get the original data.
• The message of acknowledgment will be sent by the receiver if packets reach the
receiver in the correct order.
• In case of a missing packet or corrupted packet, the message will be sent by the
receiver to the sender to resend the message.
Advantages of Packet Switching
• This technique cannot be used by those applications that cannot afford more delays
like applications of high-quality voice calls.
• Protocols used in this technique are complex and thus their implementation cost is
high.
• In the case of an overloaded network, the packet may get lost or there might occur
delay which causes the loss of critical information.
• On the receiver's side sorting of the packets sent by the sender is required.
In this type of packet switching the data-packets are first assembled and then
sequentially numbered. Now they are ready to travel across a predefined route, sequentially.
The information about the address is not required here, because all the data packets are sent
in sequence.
• In addition to the data transfer phase, there are setup and teardown phases.
• The resource allocation is done during the setup phase like it is done in the circuit-
switched network or it can be done on demand like in datagram networks.
• The data is in the form of packets like the datagram network and also each packet
carries the destination address in the header.
• Like the circuit-switched network, all packets in the Virtual network follows the same
path that is established during the connection.
• This switching is normally implemented in the data link layer
Multiplexing:
The set of techniques that allows the simultaneous transmission of multiple signals
across a single data link is commonly referred to as Multiplexing. Multiplexing is done by
using the hardware that is called as Multiplexer(MUX).
The Multiplexer(MUX) mainly combines 'n' input lines in order to generate '1' output
line (this is simply many-to-one) on the sender side. And on the receiver side, this stream is
fed into the demultiplexer(DEMUX), which then separates the stream back to its component
transmission (this is one-to-many) and then directs them to their corresponding lines.
1. Frequency-division multiplexing
2. Wavelength-division multiplexing
3. Time-division multiplexing
• With this technique, signals having different frequencies are combined in a composite
signal and then transmitted on the link
• It is mainly applied at the time when the bandwidth of the link is greater than the
combined bandwidths of the signal to be transmitted.
• In this, each signal is of a different frequency.
• The channel is usually separated by the strips of unused bandwidth that is the guard
bands in order to prevent the signals from overlapping.
• In the case of frequency division multiplexing, suppose the input signal is in the
digital form then it must be converted to analog before giving it as the input to the
modulator.
Advantages
Disadvantages
Applications:
2. Wavelength-Division Multiplexing
Disadvantages
3. Time-Division Multiplexing
Time-Divison multiplexing is a digital technique for multiplexing.
• In this technique, the channel/link is divided on the basis of time instead of frequency.
• The total available time on the channel is divided between the different users on the
channel.
• A particular time interval is allotted to each user on the channel and it is known as
time slot/slice.
• In the time-division multiplexing, the data rate capacity should be much greater than
the data rate that is required by the sending and receiving device.