Data Communication & Networks - Notes- (Week 3)
Data Communication & Networks - Notes- (Week 3)
Networks:
1. Bluetooth
It is a Wireless Personal Area Network (WPAN) technology and is used for data communications
over smaller distances.
Bluetooth is a wireless technology that lets devices like phones, tablets, and headphones connect to
each other and share information without needing cables. Bluetooth simply follows the principle
of transmitting and receiving data using radio waves.
It can be paired with the other device which has also Bluetooth but it should be within the
estimated communication range to connect. When two devices start to share data, they form a
network called piconet which can further accommodate more than five devices.
Piconet
A Piconet is a small Bluetooth network that connects devices within a range of about 10 meters. It
consists of one primary device, called the master, and up to seven secondary devices, called slaves,
making a total of eight active devices in the network. The master controls the communication in the
network, deciding when and where data is sent. Communication occurs only between the master and the
slaves, and slaves cannot communicate directly with each other. The connection can be one-to-one
(master to a single slave) or one-to-many (master to multiple slaves). This master-slave model is the
foundation of Bluetooth networks, commonly known as piconets, and is widely used in devices like
wireless headphones, speakers, and other smart gadgets.
Disadvantages
It can be hacked and hence, less secure.
It has a slow data transfer rate of 3 Mbps.
WiFi is a wireless technology that allows electronic devices to connect to the internet and
communicate with each other without a physical cable.
This uses radio waves to transmit the data between a WiFi router and compatible devices like
smartphones, computers, and smart home gadgets.
These WiFi networks are common in homes, offices, and public spaces providing convenient
internet access and local connectivity.
This technology has become an essential part of modern digital life enabling wireless internet
browsing, file sharing, and device communication in various settings.
A wireless network uses radio waves, similar to how cell phones, televisions, and radios work.
Communication within a wireless network is quite similar to two-way radio communication. Here's how it
works: A computer's wireless adapter converts data into a radio signal and transmits it through an
antenna. A wireless router receives this signal, decodes it, and then sends the information to the internet
using a wired Ethernet connection.
3. 4G and 5G
1G, 2G, 3G, 4G, and 5G are the five generations of mobile networks. The "G" stands for generation, and
each generation is faster, more secure, and more reliable than the previous one.
1G
The first generation of mobile networks, which used analog technologies
Allowed users to make phone calls, but not send or receive text messages
First introduced in Japan in 1979
2G
The second generation of mobile networks, which used digital technologies
Allowed users to make voice calls, send text messages, and access limited mobile internet
3G
The third generation of mobile networks, which allowed users to make voice calls, send text messages, and
access broadband internet
4G
The fourth generation of mobile networks, which used LTE technology to provide data-only networks
The first generation to offer speeds over 1 Mbps for mobile internet
5G
The fifth generation of mobile networks, which is expected to offer speeds over 1 Gbps
Can enable new services, such as remote control of critical infrastructure, vehicles, and medical procedures
A network protocol is a set of rules that govern data communication between different devices in the
network. It determines what is being communicated, how it is being communicated, and when it is
being communicated. It permits connected devices to communicate with each other, irrespective of
internal and structural differences.
Types of Protocols:
The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer
systems communicate over a network. OSI Model was developed by the International Organization
for Standardization (ISO). The OSI Model consists of 7 layers and each layer has specific functions
and responsibilities. This layered approach makes it easier for different devices and technologies to
work together. OSI Model provides a clear structure for data transmission and managing network
issues. The OSI Model is widely used as a reference to understand how network systems function. Each
layer is a package of protocols.
1.Application layer
he Application Layer is the topmost layer of the OSI model, providing services for network applications
with the help of various protocols. It enables applications like Chrome, Firefox, or Skype, which rely on
the internet, to communicate effectively over a network. This layer includes protocols designed for
specifictasks, such as:
The Application Layer ensures smooth interaction between the user and the network by enabling these
applications to use the appropriate protocols for their specific functions.
2.Presentation Layer
- The Presentation Layer receives data from the Application Layer and performs three main functions:
a) Translation
b) Data Compression
c) Encryption/Decryption
a) Translation
b) Data Compression
Data compression reduces the number of bits used to represent the original data.
This helps to reduce the file size (e.g., a 5 MB file is compressed to 2 MB).
Smaller file sizes mean faster data transmission over the network.
Data compression is crucial for real-time audio and video streaming, where speed is important.
There are two types of compression:
c) Encryption/Decryption
To ensure the security of sensitive data, it is encrypted before transmission. Encryption converts
data into a coded format to prevent unauthorized access.
At the receiving end, the data is decrypted back into its original form.
Secure Sockets Layer (SSL) is a common protocol used for encrypting and decrypting data,
ensuring secure communication.
These processes ensure that data is accurate, secure, and transmitted efficiently
3.Session Layer
The Session Layer is responsible for the establishment, management, and termination of sessions between
two devices. It also provides authentication and security. Protocols used in the Session Layer include
NetBIOS, which helps different applications communicate with one another.
Establishing and managing connections: It sets up and manages the connections that enable the sending
and receiving of data.
Terminating connections: Once the data exchange is complete, it ensures the connection or session is
properly terminated.
a. Authentication
Before a session or connection is established with the server, the server performs a process called
authentication. This involves verifying your identity through a username and password. When the
credentials match, a connection is established between your computer and the server.
b. Authorization
After authentication, authorization is checked. The server determines whether you have
permission to access a specific file or resource. If you are not authorized, an error message such
as "Not authorized to access this page" is displayed.
c. Session Management
The Session Layer also handles session management, which includes tracking the files being
downloaded (e.g., text, images) and managing data packets sent from the server.
Note: The web browser performs the functions of the Application, Presentation, and Session
Layers in the OSI Model.
4.Transport Layer
The Transport Layer is the fourth layer in the OSI model and plays a key role in ensuring reliable
communication between devices. It is responsible for providing end-to-end communication, reliability,
and flow control. The Transport Layer breaks data into smaller segments, manages the flow of data, and
ensures that data is correctly delivered to the destination.
a. Segmentation
In segmentation, the data received from the Session Layer is divided into smaller units called segments.
Each segment contains the port numbers of the source and destination, along with a sequence number.
The port number helps direct each segment to the correct application, while the sequence number ensures
that the segments can be reassembled in the correct order at the receiver's end.
b.Flow Control :transport layer controls the amount of data being transmitted. It is a mechanism used to
manage the rate at which data is sent between two devices to ensure that the receiver can handle the
incoming data. It prevents the sender from overwhelming the receiver with too much data too quickly,
which could lead to data loss or congestion.
c. Error Control: if any data unit doesn’t arrive at the destination, transport layer uses the automatic
repeat request to retransmit the corrupted data. A group of bits called check sum are also added with the
data units to find the received corrupted segment.
The Transport Layer uses two main protocols: Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP). These protocols provide connection-oriented and connectionless
communication services.
TCP is a standard, reliable protocol that allows systems to communicate over the internet. It establishes
and maintains a connection between the sender and receiver before data transmission begins.
When data is sent over TCP, it is divided into smaller units called segments.
These segments travel over the internet, potentially taking different routes and arriving in
different orders at the destination.
TCP ensures that the data arrives in the correct order by reordering the segments at the receiving
end. It also provides error checking and acknowledgments to ensure reliable delivery, making it
suitable for applications where the complete and correct delivery of data is essential, such as web
browsing (HTTP), email (SMTP), and file transfers (FTP).
UDP is a connectionless and unreliable transport protocol. Unlike TCP, it does not establish a connection
before data transmission, and it does not provide any feedback or acknowledgments from the receiver.
This means that UDP does not guarantee the delivery or order of data, making it faster but less reliable.
UDP is suitable for applications where speed is more important than reliability, such as online
streaming (movies, music), real-time gaming, and VoIP (Voice over Internet Protocol). In
these cases, it’s acceptable if some data packets are lost or out of order, as the application can
often continue without significant disruption.
Speed: UDP is faster than TCP because it doesn't wait for acknowledgments or perform error
checking, allowing data to flow more quickly.
Reliability: TCP is more reliable because it ensures that all data is delivered in the correct order,
with error checking and retransmission of lost packets.
Use cases:
o TCP is used in situations where complete data delivery is critical, like web browsing,
emails, and file transfers.
o UDP is preferred for applications where speed is prioritized over reliability, such as
online video streaming, gaming, and voice calls.
In summary, TCP is a connection-oriented protocol that guarantees reliable data transmission, while UDP
is a connectionless protocol that prioritizes speed and is suitable for real-time applications.
5.Network Layer
The Transport Layer is responsible for breaking data into smaller units called segments and sending them
to the Network Layer. The segments, which contain the data and necessary control information, are
passed from the Transport Layer to the Network Layer for further processing. The Network Layer then
handles the routing and forwarding of these segments to the destination device.
Key Functions:
a) Logical Addressing: The Network Layer adds the source and destination IP addresses
to each segment, creating data packets. This ensures that data reaches the correct device
on the network.
b) Routing: The Network Layer determines the best path for data to travel between the
source and destination using routing algorithms. path determination: it determines the
best path for data delivery. It uses protocols ( Open Shortest Path First) ,(Border Gateway
Protocol)
c) Fragmentation: If the packet size exceeds the maximum transmission size of the next
network, it divides the packet into smaller fragments.
Output: The Network Layer passes packets to the Data Link Layer.
Key Functions:
a.Framing: The Data Link Layer encapsulates the packets into frames by adding a header (with source
and destination MAC addresses) and a trailer (used for error detection).
b. Error Detection: The trailer contains a checksum value to detect transmission errors.
c.Flow Control: It manages data flow to prevent congestion between sender and receiver.
Output: The Data Link Layer passes frames to the Physical Layer.
7.Physical Layer
Input from Data Link Layer: The Data Link Layer sends frames to the Physical Layer.
Key Functions:
Bit-Level Transmission: The Physical Layer converts the frames into a series of binary
bits (0s and 1s).
Signal Transmission: These bits are then transmitted as electrical signals, light pulses, or
radio waves over the physical medium (e.g., Ethernet cables, fiber optics, or wireless
signals).
Output: The Physical Layer sends the data as raw signals through the physical medium to the destination
device.
How Data Flows in the OSI Model?
When we transfer information from one device to another, it travels through 7 layers of OSI model. First
data travels down through 7 layers from the sender’s end and then climbs back 7 layers on the receiver’s
end.
Data flows through the OSI model in a step-by-step process:
Application Layer: Applications create the data.
Presentation Layer: Data is formatted and encrypted.
Session Layer: Connections are established and managed.
Transport Layer: Data is broken into segments for reliable delivery.
Network Layer: Segments are packaged into packets and routed.
Data Link Layer: Packets are framed and sent to the next device.
Physical Layer: Frames are converted into bits and transmitted physically.
Each layer adds specific information to ensure the data reaches its destination correctly, and these steps
are reversed upon arrival.