Unit- 1 Data Communication and Networking
Unit- 1 Data Communication and Networking
1
NETWORKING FUNDAMENTALS
Unit Structure
1.0 Objectives
1.1 Introduction
1.2 Data & Information
1.3 Data Communication
1.3.1 Characteristics of Data Communication
1.3.2 Components of Data Communication
1.4 Data Representation
1.5 Data Flow
1.5.1. Simplex
1.52. Half Duplex
1.5.3. Full Duplex
1.6 Computer Network
1.6.1 Categories of a network
1.7 Protocol
1.7.1 Elements of a Protocol
1.8 Standards In Networking
1.8.1 Concept of Standard
1.8.2 Standard Organizations in field of Networking
1.9 Review Questions
1.10 References
1.0 OBJECTIVES:
1.1 INTRODUCTION
Data refers to the raw facts that are collected while information
refers to processed data that enables us to take decisions.
Ex. When result of a particular test is declared it contains data
of all students, when you find the marks you have scored you
have the information that lets you know whether you have
passed or failed.
The word data refers to any information which is presented in a
form that is agreed and accepted upon by is creators and users.
1. Message
Message is the information to be communicated by the sender to
the receiver.
2. Sender
The sender is any device that is capable of sending the data
(message).
3. Receiver
The receiver is a device that the sender wants to communicate the
data (message).
4. Transmission Medium
It is the path by which the message travels from sender to receiver.
It can be wired or wireless and many subtypes in both.
4
5. Protocol
It is an agreed upon set or rules used by the sender and
receiver to communicate data.
A protocol is a set of rules that governs data communication.
A Protocol is a necessity in data communications without
which the communicating entities are like two persons trying
to talk to each other in a different language without know the
other language.
1. Text
Text includes combination of alphabets in small case as well
as upper case.
It is stored as a pattern of bits. Prevalent encoding system :
ASCII, Unicode
2. Numbers
Numbers include combination of digits from 0 to 9.
It is stored as a pattern of bits. Prevalent encoding system :
ASCII, Unicode
3. Images
―An image is worth a thousand words‖ is a very famous saying.
In computers images are digitally stored.
A Pixel is the smallest element of an image. To put it in simple
terms, a picture or image is a matrix of pixel elements.
The pixels are represented in the form of bits. Depending upon
the type of image (black n white or color) each pixel would
require different number of bits to represent the value of a pixel.
The size of an image depends upon the number of pixels (also
called resolution) and the bit pattern used to indicate the value
of each pixel.
Example: if an image is purely black and white (two color) each
pixel can be represented by a value either 0 or 1, so an image
made up of 10 x 10 pixel elements would require only 100 bits in
memory to be stored.
On the other hand an image that includes gray may require 2
bits to represent every pixel value (00 - black, 01 – dark gray, 10
5
4. Audio
Data can also be in the form of sound which can be recorded
and broadcasted. Example: What we hear on the radio is a
source of data or information.
Audio data is continuous, not discrete.
5. Video
Video refers to broadcasting of data in form of picture or movie
1.5.1 Simplex
Definition:
A computer network can be defined as a collection of nodes.
A node can be any device capable of transmitting or
receiving data.
The communicating nodes have to be connected by
communication links.
1.7 PROTOCOL
A. Syntax
It means the structure or format of the data.
It is the arrangement of data in a particular order.
B. Semantics
It tells the meaning of each section of bits and
indicates the interpretation of each section.
It also tells what action/decision is to be taken based
on the interpretation.
C. Timing
It tells the sender about the readiness of the receiver to
receive the data
It tells the sender at what rate the data should be sent
to the receiver to avoid overwhelming the receiver.
1. De facto Standard
o These are the standards that have been traditionally
used and mean by fact or by convention
o These standards are not approved by any organized
body but are adopted by widespread use.
2. De jure standard
o It means by law or by regulation.
o These standards are legislated and approved by
an body that is officially recognized.
o Examples of Forums
1. ATM Forum
2. MPLS Forum
3. Frame Relay Forum
1.9 REFERENCES
Network Topologies: The art or arrangement of connecting different computers in a network
is known as network topology. In other words we can say that the way in which the nodes
(computer or other devices that needs to communicate) of a network are linked together is
known as network topology.
There are some factors to be considered while choosing a topology. They are:-
1. The cost of establishing the network topology.
2. The length of the cable needed.
3. Type of cable to be used in the topology (Cable types: Co-axial, Twisted Pair or
Optical Fiber Cable).
Types of Network Topologies: Network topologies can be classified into the following
categories:
1. Star topology: In a star topology, all the nodes are connected to a central system
called switch or a hub. This network device forwards the data from its source
computer to its final destination. The switch or hub controls the communication on the
network.
Advantages of star topology: Some of its advantages are as follow:
1) If any one of the local computers fails, the remaining portion of the network
remains unaffected.
2) Fault detection is easier.
3) Access protocols used in the star topology are very simple.
4) Devices can be added or removed without disturbing the network.
5) They work well under heavy loading.
Disadvantages of star topology: Some of its advantages are as follow:
1) The system crucially depends on the central switch or hub. If it fails, the entire
network goes down.
2) The cost of installation is high as each node is connected to the central switch
or hub.
3) Performance is totally based on the central switch or hub.
2. Ring Topology: In ring topology, the nodes are connected to a close loop so that each
device is connected to two other devices, one on either side. The computers in a ring
topology are connected in the shape of a closed ring. Data travels in only one
direction in a ring. Each computer passes the data o the next one on the line
automatically.
Advantages of ring topology: Some of its advantages are as follow:
1) The ring topology works well where there is no central site computer system.
2) It is more reliable than star topology.
3) The possibility of collision is minimal in ring topology.
4) The cost of installation and expansion is very less.
Disadvantages of ring topology: Some of its advantages are as follow:
1) The ring topology requires more complicated control software.
2) Failure of one node result in the failure of the entire network.
3) Troubleshooting or fault detection is difficult in ring topology.
4) Addition of nodes in between or removal of nodes can disturb the whole
network.
5) Communication delay is directly proportional to the number of nodes in the
network.
3. Bus Topology: In a bus topology or linear topology, the nodes are connected to a
central cable called bus. In bus topology, a bus is a single continuous cable.
Transmission from any node travels the length of the bus in both directions and can be
received by all the other nodes in the network. The bus has terminators at either ends
which absorbs the signal, removing it from the bus.
Advantages of bus topology: Some of its advantages are as follow:
1) It is quite simple and reliable.
2) It is quite easy to set up and expand up to a certain limit.
3) Failure of one node does not affect the rest of the network.
4) The cost of installation and expansion is very less.
Disadvantages of bus topology: Some of its advantages are as follow:
1) It offers limited flexibility for change.
2) The signal on the bus must be strong enough to reach the receiver if not then
repeaters might have to be used to amplify the signal.
3) Fault detection is difficult as it is to be performed at many points on the
network.
4) As each node is directly connected to the central bus, there has to be some way
of deciding which node can use the network at a given time.
4. Mesh Topology: In mesh topology, every device is connected to another device via
dedicated channel, dynamically and non-hierarchically. Routers are used to provide
the best and most efficient data path for effective communication. In the event of a
hardware failure, many routes are available to continue the network communication
process.
Advantages of mesh topology: Some of its advantages are as follow:
1) It is robust and secure.
2) Fault detection is easier.
3) It provides privacy due to dedicated channels connected dynamically.
4) Data is reliable because data is transferred among the devices through
dedicated channels or links.
Disadvantages of mesh topology: Some of its advantages are as follow:
1) Installation and configuration is difficult.
2) Cost of cables is high as bulk wiring is required.
3) Suitable of less number of devices.
Note: For (N) number of devices number of ports required will be (N-1). Total
number of dedicated links required to connect them is N (N-1)/2
5. Tree Topology: Tree Topology is a combination of bus and star topology in which
many nodes are connected with each other like the branches of a tree. It is the
simplest form in which the hub or switch devices are directly connected to the tree
bus. Data transmission takes place in the same way as in the bus topology that is when
the signal reaches the end of the transmission medium, it is absorbed by the
terminators. Tree topology is best suited for applications which have a hierarchical
flow of data and control.
Advantages of tree topology: Some of its advantages are as follow:
1) It is highly flexible and its future expandability of the network is much better
than bus topology.
2) Centralized monitoring makes users to control and manage a larger network
easily.
3) It is easy to reconfigure the tree topology.
4) It reduces network traffic.
5) As tree topology is a large network all, computers have better access to the
network.
6) In tree topology each computer is connected to the hub and also each part of a
network is connected to the main cable providing point to point connection.
7) Tree topology is supported by many hardware and software venders.
8) The signals that are transmitted by the root nodes are received by all the
computers at the same time
Disadvantages of tree topology: Some of its advantages are as follow:
1) In tree topology if the backbone of the entire network breaks both part of the
network might not communicate to each other but a part of the network
continues to communicate alone.
2) Tree topology is difficult to configure because of its size. Wiring big size
network is difficult.
3) The cost of installation and expansion is high.
6. Hybrid Topology: A hybrid topology is a type of network topology that uses two or
more other network topologies, including bus topology, mesh topology, ring topology,
star topology, and tree topology. This is a scalable topology which can be expanded
easily. It is reliable one but at the same it is a costly topology.
Advantages of hybrid topology: Some of its advantages are as follow:
1) It is effective and reliable.
2) Fault detection is easy.
3) Failure of one node does not affect the rest of the network.
4) It is flexible and its future expandability of the network is possible.
5) It is scalable as it offers integration of new hardware components.
Disadvantages of hybrid topology: Some of its advantages are as follow:
1) Network Processing on hybrid topology is quite complicated.
2) Installation and configuration is difficult.
3) The cost of installation and expansion is high.
7. Point to Point Topology: In a point to point topology there are only two nodes which
are connected with each other via a dedicated link. It’s the simplest layout for any
network, and it is pretty easy to visualize. Data transfer can take place using half
duplex (Transmission of signals in both directions but not simultaneously) and full
duplex (Transmission of signals in both directions simultaneously).
Advantages of point to point topology: Some of its advantages are as follow:
1) Very easy to set up.
2) Best suitable for very small network.
3) Fault detection is easy.
4) Easy to maintain the layout with two nodes.
Disadvantages of point to point topology: Some of its advantages are as follow:
1) It offers no flexibility or expansion.
2) Not suitable for more than two nodes.
3) Failure of one node result in the failure of the entire network.
The OSI (Open Systems Interconnection) model
Bit Synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at the bit level.
Bit Rate Control: The Physical layer also defines the transmission rate i.e. the number
of bits sent per second.
Physical Topologies: Physical layer specifies how the different, devices/nodes are
arranged in a network i.e. bus topology , star topology , or mesh topology .
Transmission Mode: Physical layer also defines how the data flows between the two
connected devices. The various transmission modes possible are Simplex, half-duplex
and full-duplex .
Framing: Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be accomplished by
attaching special bit patterns to the beginning and end of the frame.
Physical Addressing: After creating frames, the Data link layer adds physical
addresses (MAC addresses) of the sender and/or receiver in the header of each frame.
Error Control: The data link layer provides the mechanism of error control in which it
detects and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data may get
corrupted thus flow control coordinates the amount of data that can be sent before
receiving an acknowledgment.
Access Control: When a single communication channel is shared by multiple devices,
the MAC sub-layer of the data link layer helps to determine which device has control
over the channel at a given time.
3. Network Layer
Routing: The network layer protocols determine which route is suitable from source to
destination. This function of the network layer is known as routing.
Logical Addressing: To identify each device inter-network uniquely, the network layer
defines an addressing scheme. The sender and receiver’s IP addresses are placed in the
header by the network layer. Such an address distinguishes each device uniquely and
universally.
4. Transport Layer
Segmentation and Reassembly: This layer accepts the message from the (session)
layer, and breaks the message into smaller units. Each of the segments produced has a
header associated with it. The transport layer at the destination station reassembles the
message.
Service Point Addressing: To deliver the message to the correct process, the transport
layer header includes a type of address called service point address or port address.
Thus by specifying this address, the transport layer makes sure that the message is
delivered to the correct process.
5. Session Layer
Session Establishment, Maintenance, and Termination: The layer allows the two
processes to establish, use, and terminate a connection.
Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the
error so that the data is re-synchronized properly, and ends of the messages are not cut
prematurely and data loss is avoided.
Dialog Controller: The session layer allows two systems to start communication with
each other in half-duplex or full-duplex.
6. Presentation Layer
Translation: For example, ASCII to EBCDIC.
Encryption/ Decryption: Data encryption translates the data into another form or code.
The encrypted data is known as the cipher text and the decrypted data is known as plain
text. A key value is used for encrypting as well as decrypting data.
Compression: Reduces the number of bits that need to be transmitted on the network.
7. Application layer
Network Virtual Terminal (NVT): It allows a user to log on to a remote host.
File Transfer Access and Management (FTAM): This application allows a user to
access files in a remote host, retrieve files in a remote host, and manage or control files
from a remote computer.
Mail Services: Provide email service.
Directory Services: This application provides distributed database sources and access
for global information about various objects and services.
We can understand how data flows through OSI Model with the help of an example
mentioned below.
Step 1: Person A interacts with e-mail application like Gmail, outlook, etc. Writes his
email to send. (This happens at Application Layer).
Step 2: At Presentation Layer, Mail application prepares for data transmission like
encrypting data and formatting it for transmission.
Step 3: At Session Layer, There is a connection established between the sender and
receiver on the internet.
Step 4: At Transport Layer, Email data is broken into smaller segments. It adds sequence
number and error-checking information to maintain the reliability of the information.
Step 5: At Network Layer, Addressing of packets is done in order to find the best route
for transfer.
Step 6: At Data Link Layer, data packets are encapsulated into frames, then MAC address
is added for local devices and then it checks for error using error detection.
Step 7: At Physical Layer, Frames are transmitted in the form of electrical/ optical signals
over a physical network medium like ethernet cable or WiFi.
After the email reaches the receiver i.e. Person B, the process will reverse and decrypt the
e-mail content. At last, the email will be shown on Person B email client.
Advantages of OSI Model
The OSI Model defines the communication of a computing system into 7 different layers.
Its advantages include:
It divides network communication into 7 layers which makes it easier to understand and
troubleshoot.
It standardizes network communications, as each layer has fixed functions and
protocols.
Diagnosing network problems is easier with the OSI model.
It is easier to improve with advancements as each layer can get updates separately.
TCP/IP Model:
The TCP/IP model is a fundamental framework for computer networking. It stands for
Transmission Control Protocol/Internet Protocol, which are the core protocols of the Internet.
This model defines how data is transmitted over networks, ensuring reliable communication
between devices. It consists of four layers: the Link Layer, the Internet Layer, the Transport
Layer, and the Application Layer. Each layer has specific functions that help manage
different aspects of network communication, making it essential for understanding and
working with modern networks.
TCP/IP was designed and developed by the Department of Defence (DoD) in the
1960s and is based on standard protocols. The TCP/IP model is a concise version of the OSI
model. It contains four layers, unlike the seven layers in the OSI model.
Application Layer
Transport Layer(TCP/UDP)
Network/Internet Layer(IP)
Network Access Layer
The Internet Layer is a layer in the Internet Protocol (IP) suite, which is the set of
protocols that define the Internet. The Internet Layer is responsible for routing packets of
data from one device to another across a network. It does this by assigning each device a
unique IP address, which is used to identify the device and determine the route that packets
should take to reach it.
Example: Imagine that you are using a computer to send an email to a friend. When you
click “send,” the email is broken down into smaller packets of data, which are then sent to
the Internet Layer for routing. The Internet Layer assigns an IP address to each packet and
uses routing tables to determine the best route for the packet to take to reach its destination.
The packet is then forwarded to the next hop on its route until it reaches its destination.
When all of the packets have been delivered, your friend’s computer can reassemble them
into the original email message.
In this example, the Internet Layer plays a crucial role in delivering the email from your
computer to your friend’s computer. It uses IP addresses and routing tables to determine the
best route for the packets to take, and it ensures that the packets are delivered to the correct
destination. Without the Internet Layer, it would not be possible to send data across the
Internet.
3. Transport Layer
The TCP/IP transport layer protocols exchange data receipt acknowledgments and
retransmit missing packets to ensure that packets arrive in order and without error. End-to-
end communication is referred to as such. Transmission Control Protocol (TCP) and User
Datagram Protocol are transport layer protocols at this level (UDP).
TCP: Applications can interact with one another using TCP as though they were
physically connected by a circuit. TCP transmits data in a way that resembles character-
by-character transmission rather than separate packets. A starting point that establishes
the connection, the whole transmission in byte order, and an ending point that closes the
connection make up this transmission.
UDP: The datagram delivery service is provided by UDP , the other transport layer
protocol. Connections between receiving and sending hosts are not verified by UDP.
Applications that transport little amounts of data use UDP rather than TCP because it
eliminates the processes of establishing and validating connections.
4. Application Layer
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-
end communication and error-free delivery of data. It shields the upper-layer applications
from the complexities of data. The three main protocols present in this layer are:
HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used by the
World Wide Web to manage communications between web browsers and servers.
HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket
Layer). It is efficient in cases where the browser needs to fill out forms, sign in,
authenticate, and carry out bank transactions.
SSH: SSH stands for Secure Shell. It is a terminal emulations software similar to
Telnet. The reason SSH is preferred is because of its ability to maintain the encrypted
connection. It sets up a secure session over a TCP/IP connection.
NTP: NTP stands for Network Time Protocol. It is used to synchronize the clocks on
our computer to one standard time source. It is very useful in situations like bank
transactions. Assume the following situation without the presence of NTP. Suppose you
carry out a transaction, where your computer reads the time at 2:30 PM while the server
records it at 2:28 PM. The server can crash very badly if it’s out of sync.
The host-to-host layer is a layer in the OSI (Open Systems Interconnection) model that is
responsible for providing communication between hosts (computers or other devices) on a
network. It is also known as the transport layer.
Example: Consider a network with two hosts, A and B. Host A wants to send a file to host
B. The host-to-host layer in host A will break the file into smaller segments, add error
correction and flow control information, and then transmit the segments over the network to
host B. The host-to-host layer in host B will receive the segments, check for errors, and
reassemble the file. Once the file has been transferred successfully, the host-to-host layer in
host B will acknowledge receipt of the file to host A.
In this example, the host-to-host layer is responsible for providing a reliable
connection between host A and host B, breaking the file into smaller segments, and
reassembling the segments at the destination. It is also responsible for multiplexing and
demultiplexing the data and providing end-to-end communication between the two hosts.
Difference between TCP/IP and OSI Model
TCP/IP OSI