Unit 1, Data Communication and Computer Network
Unit 1, Data Communication and Computer Network
11-09-2023 2
Data Communication and
Computer Network
UNIT-1
• Basics of Computer Networks: Computer Network, Definition, Goals, Applications, Components, Topology
and its types, Types of Networks, (LAN, MAN, WAN, Internet), Broadcast & Point-To-Point Networks,
Modes of transmission (Serial, Parallel, Synchronous, Asynchronous and Isochronous).
• Modes of Communication: Simplex, Half Duplex, Full Duplex, Protocols and Standards.
• Network Models: Design issues of the layer, Protocol Hierarchy,
• ISO-OSI Reference Model: Internet Model, TCP/IP Protocol Suite, Ports, and Comparison of ISO-OSI and
Internet Model. Multiplexing (FDM, WDM and TDM), and switching (Circuit switching, Packet Switching and
Comparison of both)
• Computer Network is a group of computers connected with each
other through wires, optical fibres or optical links so that various
devices can interact with each other through a network.
• The aim of the computer network is the sharing of resources among
various devices.
Features Of Computer network
• 1) Communication speed
• Network provides us to communicate over the network in a fast and
efficient manner. For example, we can do video conferencing, email
messaging, etc. over the internet.
• 2) File sharing
• File sharing is one of the major advantage of the computer network.
Computer network provides us to share the files with each other
•
• 3) Backup
• Since the files are stored in the main server which is centrally located.
Therefore, it is easy to take the back up from the main server.
• 4) Software and Hardware sharing
• We can install the applications on the main server, therefore, the user
can access the applications centrally. So, we do not need to install the
software on every machine. Similarly, hardware can also be shared.
• 5) Security
• Network allows the security by ensuring that the user has the right to
access the certain files and applications.
• 6) Scalability
• Scalability means that we can add the new components on the network.
Network must be scalable so that we can extend the network by adding
new devices. But, it decreases the speed of the connection
• 7) Reliability
• Computer network can use the alternative source for the data
communication in case of any hardware failure.
Network Architecture
• In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.
• A device can only send the data but cannot receive it or it can receive the data
but cannot send the data.
• This transmission mode is not very popular as mainly communications require the
two-way exchange of data. The simplex mode is used in the business field as in
sales that do not require any corresponding reply.
• The radio station is a simplex channel as it transmits the signal to the listeners but
never allows them to transmit back.
• Keyboard and Monitor are the examples of the simplex mode as a keyboard can
only accept the data from the user and monitor can only be used to display the
data on the screen.
• The main advantage of the simplex mode is that the full capacity of the
communication channel can be utilized during transmission.
Half-Duplex mode
• In Parallel Transmission, data consisting of 1s and 0s, may be organized into groups of
n bits each. Computers produce and consume data in groups of bits. By grouping, we
can send data n bits at a time instead of 1bit. This is called parallel transmission.
• In parallel transmission we use n wires to send n bits at one time. That way each bit
has its own wire, and all n bits of one group can be transmitted with each clock tick
from one device to another. The following figure shows how parallel transmission works
for n =8. Typically, the eight wires are bundled in a cable with a connector at each end.
• The advantage of parallel transmission is speed. All else being equal, parallel
transmission can increase the transfer speed by a factor of n over serial
transmission. But the disadvantage is cost. Parallel transmission requires n
communication lines just to transmit the data stream. Because this is expensive,
parallel transmission is usually limited to short distances.
•
Serial Transmission
• In synchronous transmission, the bit stream is combined into longer "frames," which
may contain multiple bytes. Each byte, however, is introduced onto the transmission
link without a gap between it and the next one. It is left to the receiver to separate the
bit stream into bytes for decoding purposes.
The following figure show illustration of synchronous transmission.
• The sender puts its data onto the line as one long string. If the sender wishes to send
data in separate bursts, the gaps between bursts must be filled with a special
sequence of 0s and 1s that means idle. The receiver counts the bits as they arrive and
groups them in 8-bit units.
• The advantage of synchronous transmission is speed. With no extra bits or gaps to
introduce at the sending end and remove at the receiving end, and, by extension, with
fewer bits to move across the link, synchronous transmission is faster than
asynchronous transmission. For this reason, it is more useful for high-speed
applications such as the transmission of data from one computer to another.
c. Isochronous:
• In real-time audio and video, in which uneven delays
between frames are not acceptable, synchronous
transmission fails. For example, TV images are
broadcast at the rate of 30 images per second; they
must be viewed at the same rate. If each image is sent
by using one or more frames, there should be no delays
between frames. For this type of application,
synchronization between characters is not enough; the
entire stream of bits must be synchronized. The
isochronous transmission guarantees that the data
arrive at a fixed rate.
Protocols and Standards in Network:
• Computer networks are dependent on protocols and standards which
plays a vital role, which enables communication between different
devices and systems with one another and share data seamlessly.
Network protocol ensures that different technologies and
components of the network are compatible with one another,
reliable, and able to function together.
• In Order to make communication successful between devices , some
rules and procedures should be agreed upon at the sending and
receiving ends of the system. Such rules and procedures are called as
Protocols . Different types of protocols are used for different types of
communication.
Key Element
• Syntax : syntax refers to the structure or the format of the data that
gets exchanged between the devices. Syntax of message includes the
type of data, composition of message and sequencing of message.
The starting 8 bits of data is considered as the address of the sender.
The next 8 bits is considered to be the address of the receiver. The
remaining bits are considered as the message itself.
• Semantics : Semantics defines data transmitted between devices. It
provides rules and norms for understanding message or data element
values and actions.
• Timing : Timing refers to the synchronization and coordination
between devices while transferring the data. Timing ensures at what
time data should be sent and how fast data can be sent. For example,
If a sender sends 100 Mbps but the receiver can only handle 1 Mbps,
the receiver will overflow and lose data. Timing ensures preventing
data loss, collisions and other timing related issues.
• Sequence control : Sequence control ensures the proper ordering of
data packets. The main responsibility of sequence control is to
acknowledge the data while it get received, and the retransmission of
lost data.
• Flow Control : Flow control regulates device data delivery. It limits the
sender’s data or asks the receiver if it’s ready for more. Flow control
prevents data congestion and loss.
• Error Control : Error control mechanisms detect and fix data
transmission faults. They include error detection codes, data resend,
and error recovery. Error control detects and corrects noise,
interference, and other problems to maintain data integrity.
• Security : Network security safeguards data confidentiality, integrity,
and authenticity. which includes encryption, authentication, access
control, and other security procedures.
Protocol
• to make communication successful between devices , some rules and
procedures should be agreed upon at the sending and receiving ends
of the system. Such rules and procedures are called as Protocols .
Different types of protocols are used for different types of
communication.
Types of Protocol
Transmission Control Protocol (TCP)
Internet Protocol (IP)
User Datagram Protocol (UDP)
Post office Protocol (POP)
Simple mail transport Protocol (SMTP)
File Transfer Protocol (FTP)
Hyper Text Transfer Protocol (HTTP)
Hyper Text Transfer Protocol Secure (HTTPS)
• Transmission Control Protocol (TCP): TCP is a popular communication
protocol which is used for communicating over a network. It divides
any message into series of packets that are sent from source to
destination and there it gets reassembled at the destination.
• Internet Protocol (IP): IP is designed explicitly as addressing protocol.
It is mostly used with TCP. The IP addresses in packets help in routing
them through different nodes in a network until it reaches the
destination system. TCP/IP is the most popular protocol connecting
the networks.
• User Datagram Protocol (UDP): UDP is a substitute communication
protocol to Transmission Control Protocol implemented primarily for
creating loss-tolerating
• Simple mail transport Protocol (SMTP): SMTP is designed to send and
distribute outgoing E-Mail.
• File Transfer Protocol (FTP): FTP allows users to transfer files from one
machine to another. Types of files may include program files, multimedia
files, text files, and documents, etc.
• Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a
hypertext among two or more systems. HTML tags are used for creating
links. These links may be in any form like text or images. HTTP is designed
on Client-server principles which allow a client system for establishing a
connection
Standard in Network:
• A networking standard is a document that's been developed to
provide technical requirements, specifications, and guidelines that
must be employed consistently to ensure devices, equipment, and
software which govern networking are fit for their intended purpose.
• Types of Standards
• Standards are of two types
• De Facto Standard.
• De Jure Standard.
• De facto −The meaning of the work ” De Facto ” is ” By Fact ”. These
are the standards that are followed without any formal plan or
approval by any organization. They have come into existence due to
traditions or facts. For example, the HTTP had started as a de facto
standard.
• De jure − The meaning of the word “De Jure” is “By Law”. These
standards are the ones which have been adopted through legislation
by any officially recognized standards organization. Most of the
communication standards that are used today are de jure standards.
Some of the noted standards organizations are:
Error Control
• Unreliable channels introduce a number of errors in the data streams that are
communicated. So, the layers need to agree upon common error detection and error
correction methods so as to protect data packets while they are transferred.
Flow Control
• If the rate at which data is produced by the sender is higher than the rate at which data is
received by the receiver, there are chances of overflowing the receiver. So, a proper flow
control mechanism needs to be implemented.
Routing
• There may be multiple paths from the source to the destination. Routing
involves choosing an optimal path among all possible paths, in terms of
cost and time. There are several routing algorithms that are used in
network systems.
Security
• A major factor of data communication is to defend it against threats like
eavesdropping and surreptitious alteration of messages. So, there should
be adequate mechanisms to prevent unauthorized access to data through
authentication and cryptography.
OSI(Open System Interconnection)
• OSI stands for Open Systems Interconnection. It has been developed
by ISO – (International Organization for Standardization), in the year
1984. It is a 7-layer architecture with each layer having specific
functionality to perform. All these 7 layers work collaboratively to
transmit the data from one person to another across the globe.
Layers of OSI Model
• Physical Layer
• Data Link Layer
• Network Layer
• Transport Layer
• Session Layer
• Presentation Layer
• Application Layer
The seven layers of the OSI model are:
•7. Application layer: Data generated by and usable by software applications. The main protocol
used at this layer is HTTP.
•6. Presentation layer: Data is translated into a form the application can accept. Some authorities
consider HTTPS encryption and decryption to take place at this layer.
•5. Session layer: Controls connections between computers (this can also be handled at layer 4 by
the TCP protocol).
•4. Transport layer: Provides the means for transmitting data between the two connected parties, as well
as controlling the quality of service. The main protocols used here are TCP and UDP.
•3. Network layer: Handles the routing and sending of data between different networks. The most
important protocols at this layer are IP and ICMP.
•2. Data link layer: Handles communications between devices on the same network. If layer 3 is like the
address on a piece of mail, then layer 2 is like indicating the office number or apartment number at that
address. Ethernet is the protocol most used here.
•1. Physical layer: Packets are converted into electrical, radio, or optical pulses and transmitted as bits
(the smallest possible units of information) over wires, radio waves, or cables.
The OSI model is useful for helping people talk about networking equipment and protocols,
determining which protocols are used by which software and hardware, and showing roughly
how the Internet works. But it is not a rigid step-by-step definition of how Internet
connections always function.
OSI model vs. TCP/IP model
Circuit Packet
1)In-circuit switching has there 1)In Packet switching directly data
are 3 phases: transfer takes place.
• i) Connection Establishment.
• ii) Data Transfer.
• iii) Connection Released.
2)In-circuit switching, each data 2) In Packet switching, each data
unit knows the entire path unit just knows the final
address which is provided by the destination address intermediate
source. path is decided by the routers.
3) In-Circuit switching, data is 3) In Packet switching, data is
processed at the source system processed at all intermediate
only nodes including the source
4) Circuit switching is more system.
reliable. 4) Packet switching is less reliable.
5) Wastage of resources is more in 5) Less wastage of resources as
Circuit Switching compared to Circuit Switching
6) In-Circuit switching, the charge 6) In Packet switching, the charge
depends on time and distance, is based on the number of bytes
not on traffic in the network. and connection time.
Message Switching
• Data channels are shared among the communicating devices that improve the
efficiency of using available bandwidth.
• Traffic congestion can be reduced because the message is temporarily stored in
the nodes.
• Message priority can be used to manage the network.
• The size of the message which is sent over the network can be varied. Therefore,
it supports the data of unlimited size.
• Disadvantages Of Message Switching
• The message switches must be equipped with sufficient storage to enable them
to store the messages until the message is forwarded.
• The Long delay can occur due to the storing and forwarding facility provided by
the message switching technique.