Introduction To Computer Networking
Introduction To Computer Networking
Contents
1 Introduction
1.1 Data Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.1 Components of Data Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.2 Message/ Data Representation: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.3 Modes of Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.1 Network Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3 Network Topologies (? ? ??) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.1 Mesh Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.2 Star Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.3 Bus Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.4 Ring Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3.5 Hybrid Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4 Categories of Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1 LAN (Local Area Network) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.2 WAN (Wide Area Network) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3 MAN (Metropolitan Area Network) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.4 Other Area Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5 Protocols & Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.1 Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.2 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2 Network Models
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1.1 Layered Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1.2 Design issues for layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1.3 Connection Oriented & Connection Less Services . . . . . . . . . . . . . . . . . . . . . . . .
2.2 OSI Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.1 Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.2 Data Link Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.3 Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.4 Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.5 Session Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.6 Presentation Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.7 Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3 TCP/IP Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.1 Network Access Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.2 Internet Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.3 Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.4 Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4 Types of Addresss in Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.1 Physical / MAC / Hardware Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.2 IP / Logical / Networking Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.3 Port / Service Point Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.4 Specific Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Page | 1
Computer Communication and Telecom Networks (Chapter 1)
Introduction
1
1.1 Data Communication
Data communication means exchange of data between two devices with the help of some form of transmission medium such as a wire
cable.The effectiveness of a data communications system depends on four fundamental characteristics:
Story : Once upon a time there was a gentlemen named “Santa”. He was very intelligent (Not Joking) and used to work in
Infosys. He thought of switching to Satyam so he wrote an application to the H.R. of Satyam with his resume. But
unfortunately it was delivered to H.R. of Infosys (–Delivery–). He lost his job at Infosys. He reposted the letter to H.R. of
Satyam expecting it to deliver to the right person. This time it was delivered correctly but instead of the resume he
attached his wedding letter (–Accuracy–). He was blacklisted in Satyam. Then he tried to send his resume to Microsoft,
this time the destination was correct and the attachment was also correct but the letter reached Microsoft after a month(–
Timeliness–). Finally he sent his resume to Google, and luckily everything went well and he got the job. But as much as he
was intelligent he was lazy too. He used to come late for work, he also took a lot of half days and leaves which resulted in
termination from his job(–Jitter–). So don’t be Santa and stick to one good job and follow all the four rules of
1
communication. :
1. Message : The message is the information (data) to be communicated. Popular forms of information include
text, numbers, pictures, audio, and video.
2. Sender : The sender is the device that sends the data message.
Page | 2
Computer Communication and Telecom Networks (Chapter 1)
Page | 3
Computer Communication and Telecom Networks (Chapter 1)
Text:
Text is represented as a bit pattern, a sequence of bits (Os or Is). Different sets of bit patterns have been designed to represent
text symbols.( viz: Unicode, which uses 32 bits to represent a symbol or character used in any language in the world. or The
American Standard Code for Infor- mation Interchange (ASCII) has 128 characters.)
Numbers:
Numbers are also represented by bit patterns. However, a code such as ASCII is not used to represent numbers; the
number is directly converted to a binary number to simplify mathematical operations.
Images:
Images are also represented by bit patterns. An image is composed of a matrix of pixels (picture elements), after an
image is divided into pixels, each pixel is assigned a bit pattern. The size and the value of the pattern depends on the
depth and resolution of the image.
Simplex:
Only one of the two devices on a link can transmit; the other can only receive. e.g: T.V., Radio.
Half-Duplex:
Each station can both transmit and receive, but not at the same time. When one device is sending, the other can only
receive, and vice versa. e.g: Walkie Talkie.
Full-Duplex:
Page | 4
Computer Communication and Telecom Networks (Chapter 1)
Both stations can transmit and receive simultaneously as shown in Fig. 1.2. e.g: Telephone
Page | 5
Computer Communication and Telecom Networks (Chapter 1)
Page | 6
Computer Communication and Telecom Networks (Chapter 1)
1.2 Networks
A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a
computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the
network.
A network should satisfy following three criteria :-
1. Performance : is measured with the help of throughput and delay. Ideally throughput should be high and delay
should be less. But both these parameters are contradictory.
2. Reliability : is measured by the frequency of failure, the time it takes a link to recover from a failure, and the
network’s robustness in a worst operating conditions.
3. Security : Network security issues include protecting data from unauthorized access, protecting data from damage and
development, and implementing policies and procedures for recovery from breaches and data losses.
Page | 7
Computer Communication and Telecom Networks (Chapter 1)
3. Good Privacy & Security : Because of the dedicated links there is no intermediate node involved in the
communication.
4. Easy Fault Finding : Because of the dedicated links fault location can be easily identified.
5. Rerouting Possible : If any link is down the data can be sent through other paths with the help of other nodes
connected to the affected node.
Disadvantages
1. Difficult Installation & Reconnection : For every new computer added, n 1 cables and I/O Ports are required.
2. Large Space Required for Installation: Since the number of cables and the I/O ports are very high it requires a
lot of space for installation.
3. High Hardware Cost: In a typical case of a LAN with 40 computers, 780 cables should be running to and fro
connecting every node and every node must have 39 NIC’s on each computer. This results in a high hardware
cost.
Applications
1. Backbone of Telephone Network.
Page | 8
Computer Communication and Telecom Networks (Chapter 1)
Advantages
1. Moderate Traffic : If a Hub is used as a central controller then at a time only two devices can communicate
whereas if a Switch is used any pair of devices can communicate at the same time.
2. Moderate Privacy & Security : If a Hub is used the message is broad casted to all the devices and hence there is no
Privacy and Security but this may be solved with the use of a Switch as it does not transmit the message to all the devices.
Also if the Hub / Switch is compromised there will be no Privacy & Security.
3. Easy Fault Finding : Because of the dedicated links between the devices and the central controller fault
location can be easily identified.
4. Easy Installation & Reconnection : For every new computer added, there is no change on the other devices on
the network and only one cable is required for the connection with the central controller.
Disadvantages
1. Hub/Switch is Central Point of Failure : If Hub/Switch is damaged or unstable leads to breakdown of the
whole network.
2. Rerouting Not Possible : If any link is down the data cannot be sent through any alternate paths.
3. Moderate Cost of Cables : Even though every device needs only one link to connect to the Hub but these
links/wires needs to be drawn from all the devices to a central location where the hub is situated which
requires more cabling as compared Bus & Ring Topology.
Applications
1. Local Area Network.
Advantages
1. Low Cabling Cost: Since there is only one cable running the entire place and only tapings are added to this
cable for connection of the nodes there is a low cabling cost compared to the previous two topologies.
2. Low Hardware Cost: Only one Network Interface card is required per computer results in a low hardware
cost.
3. Less Space Required for Installation: Since the number of cables are very less the installation doesn’t require
large space.
Page | 9
Computer Communication and Telecom Networks (Chapter 1)
Disadvantages
1. High Traffic : Since the backbone acts as a common media for the communication between nodes only two
nodes can communicate at the same time resulting in a lot of waiting time.
2. Low Privacy & Security : Because of the common backbone all the data transmitted is received by all the
nodes hence there is very low Privacy & Security.
3. Difficult Fault Finding : Since there is no dedicated link between devices it is very difficult to identify the
location of the problem.
4. Easy Installation but Difficult Reconnection : Initial Installation is easy as once the location of the tapings are
identified then the nodes can be directly tapped on to the backbone but if a reconnection is required as in a
new computer needs to be added then the complete tapings needs to be reconnected so that the Heat
Dissipation and Reflections are minimized.
5. Backbone is Central Point of Failure : If Backbone is damaged or unstable leads to breakdown of the whole
network.
6. Rerouting Not Possible : If any link is down the data cannot be sent through any alternate paths.
Applications
1. Old Local Area Networks.
2. LocalTalk
Advantages
1. Low Cabling Cost: Since the device is connected only to its neighbors the number of cables required is less.
2. Moderate Hardware Cost: Every physically connected node requires only two Network Interface Cards
results in a moderate hardware cost.
3. Less Space Required for Installation: Since the number of cables are very less the installation doesn’t require
large space.
4. Easy Fault Finding : Since there is a point to point connection with the neighbors fault finding is easy.
5. Easy Installation & Reconnection : Initial installation is easy and additional nodes can be easily added
without disturbing the whole network hence reconnection is also easy.
6. No Central Point of Failure : There is no central point of failure if Dual Ring Topology is used.
7. Rerouting is Possible : Rerouting of data is possible as every node has two outgoing paths. But rerouting is
not possible if Token Ring topology is used alone.
Page | 10
Computer Communication and Telecom Networks (Chapter 1)
Disadvantages
1. High Traffic : Since only tow nodes communicate while the others are forwarding their data results in a lot of
waiting time.
2. Low Privacy & Security : Because the forwarding nodes also receive the data from the actual communicating
node there is low Privacy & Security.
Applications
1. SONET Networks.
2. FDDI Networks
Page | 11
Computer Communication and Telecom Networks (Chapter 1)
3. Local Sharing : They allow users to be able to communicate, share computer files, share games, and share
printers locally.
4. Link Speed : High speed links available. Completely dependent on the internal network and link speed.
5. Technologies : The most common technologies used by LAN are: Ethernet, FDDI and Token Ring.
2. Distributed Ownership : WANs are not owned, controlled, or managed by any one person or organization,
instead its ownership and management is distributed.
Page | 12
Computer Communication and Telecom Networks (Chapter 1)
3. Global Sharing : WANs are used to connect LANs and provide access to computers or file servers outside of
their area. They allow users to communicate, share files, and e-mail over larges distances. They also allow
users to be able to browse the Internet.
4. Link Speed : Low speeds compared to LANs. Completely dependent on the service providers.
5. Technologies : The most common technologies used by WAN are: modems, ISDN, DSL, and ATM.
Page | 13
Computer Communication and Telecom Networks (Chapter 1)
VPNs are logical networks that are constructed within a public network infrastructure. VPN offers secure, reliable
connectivity over a shared public network such as the Internet. VPNs allow a telecommuter to be able to remotely
access the network of a company.
1.5.1 Protocols
For communication to occur, the entities must agree on a protocol. A protocol is a set of rules that govern data
communications. A protocol defines what is communicated, how it is communicated, and when it is communicated.
The key elements of a protocol are syntax, semantics, and timing.
1. Syntax (Symbolic representation): The term syntax refers to the structure or format of the data, meaning the
order in which they are presented.
2. Semantics (Meaning): Semantics refers to the meaning of each section of bits. How is a particular pattern to
be interpreted, and what action is to be taken based on that interpretation. For example two programs written
in different languages could do the same thing (semantics) but the symbols used to write the program would
be different (syntax).
3. Timing : The term timing refers to two characteristics: when data should be sent and how fast they can be
sent. For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1Mbps, the
transmission will overload the receiver and some data will be lost.
1.5.2 Standards
Standards are classified broadly into De facto Standards & De jure Standards.
1. De facto : Standards that have not been approved by an organized body but have been adopted as standards
through widespread use are de facto standards.
2. De jure : Those standards that have been legislated by an officially recognized body are de jure standards.
Page | 14
Computer Communication and Telecom Networks (Chapter 1)
Standards are developed through the cooperation of standards creation committees, forums, and government
regulatory agencies. e.g: International Organization for Standardization (ISO),International Telecommunication
Union Telecommunication Standards Sector (ITU-T), American National Standards Institute (ANSI), Institute of
Electrical and Electronics Engineers (IEEE), Electronic Industries Association (EIA), Federal Communications
Commission (FCC).
Page | 15
Computer Communication and Telecom Networks (Chapter 1)
Imp. Questions
1. Explain any two topologies in detail.[10 marks]
2. Explain Hybrid topology. Draw a Tree Topology with a single Bus & 3 star networks. [5 marks]
3. Differentiate between LAN, MAN & WAN. [5 marks]
Exercises
1. For n devices in a network, what is the number of cable links required for a mesh, ring, bus, and star topology?
2. Assume six devices are arranged in a mesh topology. How many cables are needed? How many ports are
needed for each device?
3. Draw a hybrid topology with a star backbone and three ring networks.
4. Draw a hybrid topology with a ring backbone and two bus networks.
Page | 16
Computer Communication and Telecom Networks (Chapter 1)
Network Models
2
2.1 Introduction
There are two theoretical models used to describe the way networking should work. Open System Interconnection(OSI)
Model & the TCP/IP Model. The first network model called the OSI Model is both a theoretical model, and a practical
model of the OSI Networking Protocols based on the concepts of abstracting behaviors and providing standardized
interfaces between layered technologies. The second model, the TCP/IP Model, directly reflects the actual networking
protocols used in the Internet and illustrates the basic operation and interactions between IP and TCP. This model is only a
practical model based on layered theory.
Layered Tasks:
Consider two friends who communicate through mail
Fig (i): Tasks involved in sending a letter In the above fig (i), we have a sender, a receiver & a carrier that transports the
letter. There is a hierarchy of tasks.
Page | 17
Computer Communication and Telecom Networks (Chapter 1)
The sender writes the letter, inserts the letter in an envelope, writes the sender & receiver addresses, and drops
the letter in a mail box.
Middle layer: The letter is picked up by a letter carrier and delivered to the post office.
Lower Layer: The letter is sorted at the post office, a carrier transports the letter.
On the way:
The letter is then on its way to the recipient. On the way to the recipients local post office, the letter may actually go
through a central office. In addition, it may be transported by truck, train, airplane, boat, or a combination of these.
Hierarchy:
The task of transporting the letter between the sender and the receiver is done by the carrier. The tasks must be done in the
order given in the hierarchy. At the sender site, the letter must be written and dropped in the mailbox before being picked
up by the letter carrier and delivered to the post office. At the receiver site, the letter must be dropped in the recipient
mailbox before being picked up & read by the recipient.
Services:
Each layer at the sending site uses the services of the layer immediately below it. The sender at the higher layer uses the
services of the middle layer. The middle layer uses the services of the lower layer. The lower layer uses the services of the
carrier.
There are two central terms for layer-oriented communication models : A protocol & an Interface.
Communication between two instances of the same layer on different computers is governed by predefined
rules. These rules are called protocols.
Page | 18
Computer Communication and Telecom Networks (Chapter 1)
Page | 19
Computer Communication and Telecom Networks (Chapter 1)
The set of functions offered by a layer, N, to its higher-order layer (N + 1), is called its service. The interface
through which this service is offered is called service interface.
1. Addressing: Mechanism for identifying senders and receivers, on the network need some form of addressing.
There are multiple processes running on one machine. Some means is needed for a process on one machine to
specify with whom it wants to communicate.
2. Error Control: There may be erroneous transmission due to several problems during communication. These are due
to problem in communication circuits, physical medium, due to thermal noise and interference. Many error
detecting and error correcting codes are known, but both ends of the connection must agree on which one being
used. In addition, the receiver must have some mechanism of telling the sender which messages have been received
correctly and which has not.
3. Flow control: If there is a fast sender at one end sending data to a slow receiver, then there must be flow
control mechanism to control the loss of data by slow receivers. There are several mechanisms used for flow
control such as increasing buffer size at receivers, slow down the fast sender, and so on. Some process will
not be in position to accept arbitrarily long messages. Then, there must be some mechanism to disassembling,
transmitting and then reassembling messages.
4. Multiplexing / demultiplexing: If the data has to be transmitted on transmission media separately, it is inconve-nient
or expensive to setup separate connection for each pair of communicating processes. So, multiplexing is needed in
the physical layer at sender end and demultiplexing is need at the receiver end.
5. Routing: When data has to be transmitted from source to destination, there may be multiple paths between
them. An optimized (shortest) route must be chosen. This decision is made on the basis of several routing
algorithms, which chooses optimized route to the destination.
1. Connection oriented service: The service user first establishes a connection, uses the connection and then releases
the connection. Once the connection is established between source and destination, the path is fixed. The data
transmission takes place through this path established. The order of the messages sent will be same at the receiver
end. Services are reliable and there is no loss of data. Most of the time, reliable service provides acknowledgment is
an overhead and adds delay.
Table 2.1: Difference between Connection Oriented & Connection Less Service
Connection Less Service Connection Oriented Ser-
vice
How is data sent? one packet at a time as continuous stream of pack-
ets
Do packets follow same route? No Yes
Are resources reserved in network? No Yes
Are resources reserved in communicat- No Yes
ing hosts (Sender & Receiver)?
Is connection establishment done? No Yes
What is impact of node/switch crash? only packets at that node are The connection is lost and all
lost packets are dropped a new
connection is required there-
after
What addressing information is needed full source and destination full source and destination
on each packet? address on each packet address only on the connec-
tion packet
Connectionless service: In this type of services, no connection is established between source and destination. Here
there is no fixed path. Therefore, the messages must carry full destination address and each one of these messages
Page | 20
Computer Communication and Telecom Networks (Chapter 1)
are sent independent of each other. Messages sent will not be delivered at the destination in the same order. Thus,
grouping and ordering is required at the receiver end, and the services are not reliable.There is no acknowledgment
confirmation from the receiver. Unreliable connectionless service is often called datagram service, which does not
return an acknowledgment to the sender.
Data encapsulation: is the process that takes place when one host on a network needs to send data to another host.
As data is prepared for transit, it flows down through each layer of the OSI model. At each layer, extra control
information is added to the data before being passed to the layer below. This process continues until the data reaches
the physical layer where the data is passed onto the network medium as a series of 0’s and 1’s. In the below Fig. 2.3
the HTML data from the Application layer is encapsulated into the Transport layer where this layer adds its own
header. Then this is passed to the Network Layer where it adds its own header and so on its continued.
Delivery of Packets: There are mainly three delivery of packets that takes place whilst transmitting data from source
to destination as shown in Fig. 2.4. If the data is to be transmitted from Node A to Node F it cannot be transmitted
directly it has to be sent to Node B then to Node E and then finally to Node F. The delivery from Node A to Node F
Page | 21
Computer Communication and Telecom Networks (Chapter 1)
is called source-to-destination delivery. whereas delivery of the data to the intermediate nodes is called hop-to-hop
delivery. Finally when the data reaches the destination it has to be delivered to the correct process. This is called the
process-to-process delivery.
Types of Delivery: There are basically two types of delivery, direct & indirect delivery. Whenever the delivery is
not to the final destination the delivery is called Indirect Delivery. Whereas if the next hop is the final destination
then that delivery is a Direct Delivery. The hop-to-hop delivery is usually a direct delivery whereas a source-to-
destination delivery consists of one or many indirect delivery followed by a direct delivery as shown in Fig. 2.5.
Page | 22
Computer Communication and Telecom Networks (Chapter 1)
1. Type of Interface & Media: The physical layer defines the characteristics of the interface between the devices
and the transmission medium. It also defines the type of transmission medium like wire, air, optical fiber.
2. Representation of bits: The physical layer transmits data in the form of stream of bits (sequence of 0s or 1s)
with no interpretation. To be transmitted, bits must be encoded into signals(electrical or optical). The physical
layer defines the type of encoding (how 0s and 1s are changed to signals).
3. Data rate: The transmission rate i.e the number of bits sent each second is also defined by the physical layer.
4. Synchronization of bits: The sender and receiver not only must use the same bit rate but also must be synchronized
at the bit level. In other words, the sender and the receiver clocks must be synchronized.
5. Line configuration: The physical layer is concerned with the connection of devices to the media. In a point-to-
point configuration, two devices are connected through a dedicated link. In a multi point configuration, a link
is shared among several devices.
6. Physical topology: The physical topology defines how devices are connected to make a network. Devices can
be connected by using a mesh topology (every device is connected to every other device), a star topology
(devices are connected through a central device), a ring topology (each device is connected to the next,
forming a ring), a bus topology (every device is on a common link), or a hybrid topology (this is a
combination of two or more topologies).
7. Transmission mode: The physical layer also defines the direction of transmission between two devices:
simplex, half-duplex, or full-duplex. In simplex mode, only one device can send; the other can only receive.
The simplex mode is a one-way communication. In the half-duplex mode, two devices can send and receive,
but not at the same time. In a full-duplex (or simply duplex) mode, two devices can send and receive at the
same time.
1. Framing: The data link layer divides the stream of bits received from the network layer into manageable data
units called frames.
2. Physical addressing: It adds the source and destination MAC Address / Physical Address / Hardware Address
to the header of the frames.
3. Flow control: If the rate at which the data transmitted by the transmitter is greater than the rate that the
receiver can handle then the data link layer imposes a flow control mechanism to avoid buffer overflow of the
receiver.
4. Error control: The data link layer adds reliability to the physical layer by adding mechanisms to detect and
retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is
normally achieved through a trailer added to the end of the frame.
5. Access control: When two or more devices are connected to the same link (Like the Bus Topology), data link
layer protocols are necessary to determine which device has control over the link at any given time.
Page | 23
Computer Communication and Telecom Networks (Chapter 1)
1. Logical addressing: The physical addressing implemented by the data link layer handles the addressing
problem locally. If a packet passes the network boundary, we need another addressing system to help
distinguish the source and destination. The Network layer adds the source and destination Logical Address /
IP Address / Networking Address to the Network layer header.
2. Routing: When working with large networks there are always multiple paths to the destination. Selection of the
best and the shortest path is called routing. This function is done by the Network Layer.
1. Service-point addressing: Computers often run several programs at the same time. Process-to-process
delivery delivers data from a specific process (running program) on one computer to a specific process
(running program) on the other. The transport layer header includes a type of address called a service-point
address (or port address) to identify each process.
2. Segmentation and reassembly: A message is divided into transmittable segments, with each segment
containing a sequence number. These numbers enable the transport layer to reassemble the message correctly
upon arriving at the destination and to identify and replace packets that were lost in transmission.
3. Connection control: The transport layer can be either connectionless or connection oriented. A connectionless
transport layer treats each segment as an independent packet and delivers it to the transport layer at the
destination machine. A connection oriented transport layer makes a connection with the transport layer at the
destination machine first before delivering the packets. After all the data are transferred, the connection is
terminated.
4. Flow control: Like the data link layer, the transport layer is responsible for flow control. However, flow
control at this layer is performed end to end rather than hop-to-hop.
5. Error control: Like the data link layer, the transport layer is responsible for error control. However, error
control at this layer is performed process-to-process rather than hop-to-hop.
Page | 24
Computer Communication and Telecom Networks (Chapter 1)
1. Dialog control: The session layer allows two systems to enter into a dialog.
2. Synchronization: The session layer allows a process to add checkpoints, or synchronization points, to a stream
of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after
every 100 pages to ensure that each 100-page unit is received and acknowledged independently. In this case,
if a crash happens during the transmission of page 523, the only pages that need to be resent after system
recovery are pages 501 to 523. Pages previous to 501 need not be resent.
1. Translation: The processes (running programs) in two systems are usually exchanging information in the
form of character strings, numbers, and so on. The information must be changed to bit streams before being
transmitted. Because different computers use different encoding systems, the presentation layer is responsible
for interoperability between these different encoding methods. The presentation layer at the sender changes
the information from its sender-dependent format into a common format. The presentation layer at the
receiving machine changes the common format into its receiver-dependent format.
2. Encryption: To carry sensitive information, a system must be able to ensure privacy. Encryption means that
the sender transforms the original information to another form and sends the resulting message out over the
network. Decryption reverses the original process to transform the message back to its original form.
3. Compression: Data compression reduces the number of bits contained in the information. Data compression
becomes particularly important in the transmission of multimedia such as text, audio, and video.
Page | 25
Computer Communication and Telecom Networks (Chapter 1)
4. Inter-process communication
5. Network management
6. Directory services
7. Electronic messaging (such as email)
Page | 26
2.3 TCP/IP Model
The TCPIIP protocol suite was developed prior to the OSI model. TCP/IP is based on a four-layer reference model.
All protocols that belong to the TCP/IP protocol suite are located in the top three layers of this model. The host-to-
network layer or commonly called as the Network Access Layer is equivalent to the combination of the physical and
data link layers of the OSI model. The Internet layer is equivalent to the network layer, and the application layer is
roughly doing the job of the session, presentation, and application layers with the transport layer in TCPI/IP Model
taking care of transport layer functions and part of the duties of the session layer too.
Layer. It is unique.
The size and format of this addresses is fixed. For IPv4 its 32 bits and for IPv6 its 128 bits.
It is added to the packet by the Network Layer.
It is unique.
e.g: 80
Port address range from 0 to 65535. This range is divided into three groups. Well-known ports ranging from 0 to 1023 used
for standard applications only. Registered ports ranging from 1024 to 49,151used by other registered applications. Dynamic ports
or the Ephemeral ports ranging from 49,152 to 65,535 may be used by any application.
Imp. Questions
1. What is the need for Layering. Discuss the design issues for layers. [10 marks]
5. Explain the following with examples:- MAC Address, IP Address, Port Address, Specific Adddress. [2 marks
each]