DCN Unit 1 Notes
DCN Unit 1 Notes
Networks(BEC-062)
2. Sender. The sender is the device that sends the data message. It can be a computer, workstation,
telephone handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer, workstation,
telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-
optic cable, and radio waves.
5. Protocol. A protocol is a set of rules that govern data communications. It represents an agreement
between the communicating devices. Without a protocol, two devices may be connected but not
communicating, just as a person speaking French cannot be understood by a person who speaks only
Japanese.
Network and Networking
• A network is a set of devices (often referred to as nodes) connected by
communication links.
o Syntax. The term syntax refers to the structure or format of the data, meaning the order in which they are
presented. For example, a simple protocol might expect the first 8 bits of data to be the address of the
sender, the second 8 bits to be the address of the receiver, and the rest of the stream to be the message
itself.
o Semantics. The word semantics refers to the meaning of each section of bits. How is a particular pattern
to be interpreted, and what action is to be taken based on that interpretation?
For example, does an address identify the route to be taken or the final destination of the message?
o Timing. The term timing refers to two characteristics: when data should be sent and how fast they can be
sent.
For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps, the
transmission will overload the receiver and some data will be lost.
Standards
• Standards are essential in creating and maintaining an open and competitive market for
equipment manufacturers and in guaranteeing national and international interoperability of
data and telecommunications technology and processes.
• Standards provide guidelines to manufacturers, vendors, government agencies, and other
service providers to ensure the kind of interconnectivity necessary in today's marketplace
and in international communications.
• Standards Organizations Standards are developed through the cooperation of standards
creation committees, forums, and government regulatory agencies.
• Data communication standards fall into two categories: de facto (meaning "by fact"
or "by convention") and de jure (meaning "by law" or "by regulation").
• In 1972, Vint Cerf and Bob Kahn, both of whom were part of the core ARPANET group,
collaborated on what they called the Internetting Projec1. Cerf and Kahn's landmark
1973 paper outlined the protocols to achieve end-to-end delivery of packets. This
paper on Transmission Control Protocol (TCP) included concepts such as
encapsulation, the datagram, and the functions of a gateway.
Internet
• It is made up of many wide- and local-area networks joined by connecting
devices and switching stations.
• It is difficult to give an accurate representation of the Internet because it
is continually changing-new networks are being added, existing networks
are adding addresses, and networks of defunct companies are being
removed.
• Today most end users who want Internet connection use the services of
Internet service providers (lSPs). There are international service providers,
national service providers, regional service providers, and local service
providers.
• The Internet today is run by private companies, not the government.
National ISP
• National Internet Service Providers The national Internet service providers are
backbone networks created and maintained by specialized companies.
There are many national ISPs operating in North America; some of the most well
known are SprintLink, PSINet, UUNet Technology, AGIS, and internet Mel.
• To provide connectivity between the end users, these backbone networks are
connected by complex switching stations (normally run by a third party) called
network access points (NAPs).
Some national ISP networks are also connected to one another by private switching
stations called peering points. These normally operate at a high data rate (up to
600 Mbps).
Structure of National ISP
Regional & Local ISP
• Regional Internet Service Providers Regional internet service providers or
regional ISPs are smaller ISPs that are connected to one or more national
ISPs. They are at the third level of the hierarchy with a smaller data rate.
2.DATA LINK LAYER: It is responsible for node to node delivery of the message. Its function is to make sure
that the data is error free
3.NETWORK LAYER: It is responsible for the transmission of data from one host to the other location by
selecting the shortest path.
4.TRANSPORT LAYER: It provides services to application layer and takes services from network layer. It is
responsible for the end to end delivery of the complete message.
5.SESSION LAYER: This layer is responsible for establishment of connection, maintenance of sessions,
authentication and also ensures security.
6.PRESENTATION LAYER: The data from the application layer is processed here as per the required format
to transmit over the network.
7.APPLICATION LAYER: This layer produces the data which has to be transferred over the network.
1. Physical Layer (OSI Layers)
Functions of the Physical Layer
•Bit synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at the bit level.
•Bit rate control: The Physical layer also defines the transmission rate i.e. the number of
bits sent per second.
•Physical topologies: Physical layer specifies how the different, devices/nodes are
arranged in a network i.e. bus, star, or mesh topology.
•Transmission mode: Physical layer also defines how the data flows between the two
connected devices. The various transmission modes possible are Simplex, half-duplex and
full-duplex.
• The packet received from the Network layer is further divided into frames depending on
the frame size of the NIC(Network Interface Card). DLL also encapsulates Sender and
Receiver’s MAC address in the header.
• The Receiver’s MAC address is obtained by placing an ARP(Address Resolution
Protocol) request onto the wire asking “Who has that IP address?” and the destination
host will reply with its MAC address.
2. Data Link Layer (OSI Layers)
Functions of the Data Link Layer
•Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a
set of bits that are meaningful to the receiver. This can be accomplished by attaching special bit
patterns to the beginning and end of the frame.
•Physical addressing: After creating frames, the Data link layer adds physical addresses (MAC
addresses) of the sender and/or receiver in the header of each frame.
•Error control: The data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
•Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus, flow control coordinates the amount of data that can be sent before receiving an
acknowledgment.
•Access control: When a single communication channel is shared by multiple devices, the MAC
sub-layer of the data link layer helps to determine which device has control over the channel at
a given time.
Note:
Switch & Bridge are Data Link Layer devices.
Packet in the Data Link layer is referred to as Frame.
Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host machines.
3. Network Layer (OSI Layers)
• The network layer works for the transmission of data from one host to the other located
in different networks.
• It also takes care of packet routing i.e. selection of the shortest path to transmit the
packet, from the number of routes available.
• The sender & receiver’s IP addresses are placed in the header by the network layer.
• Segmentation and Reassembly: This layer accepts the message from the (session) layer, and
breaks the message into smaller units. Each of the segments produced has a header associated
with it. The transport layer at the destination station reassembles the message.
• Service Point Addressing: To deliver the message to the correct process, the transport layer
header includes a type of address called service point address or port address. Thus by
specifying this address, the transport layer makes sure that the message is delivered to the
correct process.
4. Transport Layer (OSI Layers)
Services Provided by Transport Layer
1.Connection-Oriented Service
2.Connectionless Service
•Session establishment, maintenance, and termination: The layer allows the two
processes to establish, use and terminate a connection.
•Dialog Controller: The session layer allows two systems to start communication
with each other in half-duplex or full-duplex.
6. Presentation Layer (OSI Layers)
• The data from the application layer is extracted here and manipulated as per the
required format to transmit over the network.
• The presentation layer is also called the Translation layer.
•Encryption/ Decryption: Data encryption translates the data into another form or code.
The encrypted data is known as the ciphertext and the decrypted data is known as plain
text. A key value is used for encrypting as well as decrypting data.
•Compression: Reduces the number of bits that need to be transmitted on the network.
• FTAM- File transfer access and management : This application allows a user to
access file in a remote host, retrieve files in remote host and manage or
control files from a remote computer.
• Mail Services : Provide email service.
• A system that sends nothing but data from one computer to another is not complete.
Today, computers are devices that can run multiple processes at the same time.
• The end objective of Internet communication is a process communicating with
another process.
• For example, computer A can communicate with computer C by using TELNET. At the
same time, computer A communicates with computer B by using the File Transfer
Protocol (FTP). For these processes to receive data simultaneously, we need a method
to label the different processes. In other words, they need addresses. In the TCP/IP
architecture, the label assigned to a process is called a port address. A port address in
TCP/IP is 16 bits in length.
Specific Address
• Some applications have user-friendly addresses that are designed for that
specific address.
• Examples include the e-mail address (for example, [email protected]) and
the Universal Resource Locator (URL) (for example, www.mhhe.com).
• The first defines the recipient of an e-mail; the second is used to find a
document on the World Wide Web. These addresses, however, get changed to
the corresponding port and logical addresses by the sending computer,
LAYER & ADDRESSES RELATIONSHIP in
TCP/IP
IP Addressing
• A unique string of numbers separated by full stops that identifies each computer
using the Internet Protocol to communicate over a network.
• The IP address is followed by a slash and the number (in decimal) of bits used
for the network part, also called the routing prefix. For example , an IPv4
address and its subnet mask may be 192.0.2.1 and 255.255.255.0, respectively.
2) https://www.geeksforgeeks.org/open-systems-interconnection-
model-osi/