Module1.1 Updated
Module1.1 Updated
COMPUTER NETWORKS
Module-1.1
Data Communication
and Network Model
1
DATA COMMUNICATION
Accuracy: The system must deliver the data accurately. Data that have been altered
in transmission and left uncorrected are unusable.
CHARACTERISTICS OF DC
Timeliness: The system must deliver data in a timely manner.Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as they are
produced, in the same order that they are produced, and without significant delay.
Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. For example, let us assume that video packets are sent
every 30ms. If some of the packets arrive with 30-ms delay and others with 40-ms delay, an
uneven quality in the video is the result.
COMPONENTS OF DC
COMPONENTS OF DC
The five components of data communications are:
Message: The message is the information (data) to be communicated.
Popular forms of information include text, numbers, pictures, audio, and
video.
Sender: The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, mobile, and so on.
Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
Transmission medium: The transmission medium is the physical path by
which a message travels from sender to receiver. Some examples of
transmission media include twisted-pair wire, coaxial cable, fibre-optic cable,
and radio waves.
Protocol: A protocol is a set of rules that govern data communications. It
represents an agreement between the communicating devices. Without a
protocol, two devices may be connected but not communicating.
DATA REPRESENTATION
Text
Numbers
Images
Audio
Video
DATA FLOW (SIMPLEX, HALF-DUPLEX, AND FULL-DUPLEX)
DATA FLOW(CNTD)
Communication between two devices can be simplex, half-duplex, or full-
duplex as shown in figure above.
Simplex
• In simplex mode, the communication is unidirectional, as on a one-way
street.Only one of the two devices on a link can transmit; the other can
only receive.
• Example:Keyboards and traditional monitors
Half-Duplex
• In half-duplex mode, each station can both transmit and receive, but not
at the same time. When one device is sending, the other can only
receive, and vice versa.
• In a half-duplex transmission, the entire capacity of a channel is taken
over by whichever of the two devices is transmitting at the time.
Example: Walkie-Talkie
DATA FLOW(CNTD)
Full-Duplex
• In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously.
• In full-duplex mode, signals going in one direction share the capacity of
the link with signals going in the other direction.
Example: Telephone
INTRODUCTION TO NETWORKS
Performance
• Depends on Network Elements
• Measured in terms of Delay and Throughput
Reliability
• Failure rate of network components
• Measured in terms of availability/robustness
Security
• Data protection against corruption/loss of data due to:
• Errors
• Malicious users
PHYSICAL STRUCTURES
Type of Connection
• Point to Point - single transmitter and receiver
• Multipoint - multiple recipients of single transmission
Physical Topology
• Connection of devices
• Type of transmission - unicast, mulitcast, broadcast
Types of connections: point-to-point and multipoint
NETWORK TOPOLOGY
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
BUS TOPOLOGY
Bus topology is a network type in which every computer and
network device connected to single cable. When it has exactly
two endpoints, then it is called Linear Bus topology.
1.35
ELEMENTS OF A PROTOCOL
Syntax
• Structure or format of the data
• Indicates how to read the bits - field delineation
Semantics
• Interprets the meaning of the bits
• Knows which fields define what action
Timing
• When data should be sent and what
• Speed at which data should be sent or speed at which it
is being received.
NETWORK MODEL
LAYERED TASKS
• Computer networks are complex systems
Tasks involve varieties of hardware and software components, and
protocols
• Networking task is divided into several subtasks, or layers.
WHY LAYERING?
• Networks are complex!
• We need a way to organize the structure of network
functionalities and to reduce the design complexities
• Benefits of layering
✓ Interoperability
✓ Reuse
✓ Hiding underlying details
38
PROTOCOL INTERFACES
• Each protocol offers an interface to its users, and expects
one from the layers on which it builds
▫ Syntax and semantics
Data formats
Interface characteristics, e.g. IP service model
• Protocols build upon each other
▫ Add value
E.g., a reliable protocol running on top of IP
▫ Reuse
E.g., OS provides TCP, so apps don’t have to rewrite
2
REAL WORLD EXAMPLE
Communicate
40
LOGICAL CONNECTION
Communication takes place through many layers
Logical communication
Secretary:
Secretary: reads and reports
types a letter the message
Postal truck
Post office:
Processes and routes the letter
LAYER MODEL
43
TCP/IP MODEL
• The TCP/IP model was developed prior to the OSI model.
• The TCP/IP model consists of five layers: the application layer, transport layer,
network layer, data link layer and physical layer.
44
TCP/INTERNET LAYER MODEL
User
Application Layer Software
Transport Layer
Network Layer
Data Link Layer
Physical Layer Hardware
Transmission
Medium
45
TCP/IP Model: the Internet model
• Each layer relies on services from layer below
• Each layer exports services to layer above
• Interface between layers defines interaction
• Hides implementation details
• Layers can change without disturbing other layers
5 Application Application
4 Transport Transport
3 Network Network Network
2 Data link Data link Data link
1 Physical Physical Physical
2
47
APPLICATION LAYER
➢ It provides user services like user login, naming network devices, formatting messages, and
e-mails, transfer of files etc.
➢ When one application layer protocol wants to communicate with another application layer, it
forwards its data to the transport layer.
48
APPLICATION LAYER
Data Data
Logical communication
• It is responsible for end to end data transmission service using connection oriented or
either through connection-less protocols.
• TCP and UDP are two transport layer protocols that provide a different set of services
to the network layer.
• It also provides other services such as reliable data transfer, bandwidth guarantees, and
delay guarantees,flow control.
50
TRANSPORT LAYER
• Duties/services
▫ Service-point addressing/Port Address
▫ Segmentation and reassembly
▫ Connection control
▫ Flow control (end-to-end)
▫ Error control (end-to-end)
51
Transport Layer Services
• Segmentation : Large data is divided into smaller segments at the senders end and then
these smaller segments are recombined in exact format before it is received at receivers
end.
• Error Control : Distortion, Un-delivery of data packets and noise in data packets results
in error and this is prevented using Transport Layer too and this feature is called Error
Control.
• Flow Control : Transport-Layer ensures that faster data transmission and slow data
absorption or slow data transmission and faster data absorption must not occur.
52
Transport Layer
PORT # PORT #
Data Data
53
NETWORK LAYER
• Duties/services
▫ Logical addressing
▫ Routing
54
NETWORK LAYER
Data Data
55
DATA LINK LAYER
✓ Framing: The data link layer divides the stream of bits received from the network layer into manageable data
units called frames.
✓ Physical addressing: If frames are to be distributed to different systems on the network, the data link layer adds a
header to the frame to define the sender and/or receiver of the frame. If the frame is intended for a system
outside the sender's network, the receiver address is the address of the device that connects the network to the
next one.
✓ Flow control (hop-to-hop): A receiving node can receive the frames at a faster rate than it can process the frame.
Without flow control, the receiver's buffer can overflow, and frames can get lost. To overcome this problem, the
data link layer uses the flow control to prevent the sending node on one side of the link from overwhelming the
receiving node on another side of the link.
✓ Error control (hop-to-hop):The data link layer adds reliability to the physical layer by adding mechanisms to
detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error
control is normally achieved through a trailer added to the end of the frame.
✓ Access control:. When two or more devices are connected to the same link, data link layer protocols are
necessary to determine which device has control over the link at any given time.
56
DATA LINK LAYER
Data Data
58
PHYSICAL LAYER
Data Data
Transmission medium
59
Physical Layer Functions
• Synchronization of bits: the sender and the receiver clocks must be synchronized.
60
INTERNET MODEL
sender router
router receiver
Application Application
Transport Transport
Network Network Network Network
Data Link D.L. D.L. D.L. D.L. Data Link
Physical P.L. P.L. P.L. P.L. Physical
Transmission medium
61
INTERNET MODEL
62
INTERNET PROTOCOL SUITE
Layer Protocols
Application HTTP, FTP, Telnet, SMTP, ...
Transport TCP, UDP, SCTP, ...
Network IP (IPv4), IPv6, ICMP, IGMP, ...
Data Link Ethernet, Wi-Fi, PPP, ...
Physical RS-232, DSL, 10Base-T, ...
63
OSI MODEL
• OSI stands for Open System Interconnection.
• Before networks came into existence, computers could only
communicate from the same manufacturers.
• OSI was designed by ISO (International Organization for
Standardization) in late 1970’s.
• To break this barrier so that Computers from different manufacturer
could communicate with each other.
• OSI is a “Layered Approach”, which is a logical representation of
how Data Communication should occur.
64
OSI Model
UserLayer
7.Application OSI has 7 different layers
6.Presentation Layer Two new layers is added
Presentation Layer
5.Session Layer Session Layer
4.Transport Layer It is divided into two groups,
Top 3 layers defines how
3.Network Layer application within end stations will
communicate with each other and
2.Data Link Layer with the user (Software Layer).
1.Physical Layer Bottom 4 layers defines how
actually data is transferred
Transmission (Hardware Layer).
Medium
65
The OSI Reference Model
The interaction between layers in the OSI model
SESSION LAYER
• This layer is responsible for establishment of connection,
maintenance of sessions, authentication and also ensures
security.
• Duties/services
▫ Dialog Controller :
Allows the two processes to establish, use and terminate a
connection.
Communication in half-duplex or full-duplex.
▫ Synchronization :
allows a process to add checkpoints
data is re-synchronized
Session recovery
68
PRESENTATION LAYER
69
PRESENTATION LAYER FUNCTIONS
• Duties/services
▫ Data translation: For example, ASCII to EBCDIC.
▫ Encryption/Decryption
70
OSI LAYERS IN REAL WORLD
Prepares Summarizes or
6.Assistant
final version translates letter