Unit-I DCN Notes
Unit-I DCN Notes
UNIT –I
Introduction to data communication, network protocols & standards and standard
organization line configuration- topology -Transmission mode -Classification of network -OSI
model-layer of OSI model.
The purpose of Data Communications is to provide the rules and regulations that allow
computers with different disk operating systems, languages, cabling and locations to share
resources. The rules and regulations are called protocols and standards in Data
Communications.
1
DATA COMMUNICATION AND NETWORKING
For data communication to occur, the communicating devices must be part of a communication
system made up of a combination of hardware and software. The effectiveness of a data
communication system depends on the three fundamental characteristics:
1. Delivery: The System must deliver data to the correct destination. Data must be received
by the intended device or user and only by that device or user
2. Accuracy: The system must deliver data accurately. Data that have been altered in
transmission and left uncorrected are rustles
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video, audio, and voice data, timely delivery means delivering data
as they are produced, in the same order that they are produced, and without significant
delay. this kind of delivery id called real- time transmission.
member body of ISO from the United States is ANSI and that from India is BIS (Bureau of Indian
Standards).
Out of the popular standards, ISO/IEC 2701- INFORMATION SECURITY MANAGEMENT is
the standard for security of any kind of Digital information. In 1983, ISO developed the OSI reference
model, a 7 layer architecture for computer communication.
International Telecommunications Union–Telecommunications Standards Sector (ITU-T)
Earlier known as Consultative Committee for International Telegraphy and Telephony (CCITT)
worked for the research and establishment of the standards in telecommunication. In 1993, it gets the
name ITU-T. ITU-T allocates global radio spectrum and satellite orbits, develops the technical
standards for the interconnection of networks and technologies.
ANSI (American National Standards Institute)
Its a private, non-profit, non-government organization. Now its a member body of ISO
representing the US. Primarily focused in the US, it works for coordination of the US standard with
international standards. Its membership comprised of Government agencies, Organizations,
Companies, Academic and International bodies, and individuals.
IEEE (Institute of Electrical and Electronics Engineers)
IEEE (Institute of Electrical and Electronics Engineers) is the world’s largest technical
professional organization dedicated to advancing innovations in technology. IEEE’s membership has
been composed of engineers, scientists, and allied professionals since earlier. Apart from its
engineering core, IEEE members are also from several other backgrounds like computer scientists,
software developers, information technology professionals, physicists, medical doctors, and many
others. IEEE develops global standards in almost all fields including Information Technology. Among
more than a thousand standards, the IEEE 802 LAN/MAN group of standards is widely used in
computer networking which includes 802.3 aka Ethernet, 802.11, aka Wi-FI, etc.
Electronic Industries Alliance/Telecommunication Industry Association (EIA/TIA)
Electronic Industries Alliance(EIA) was known as the Electronic Industries Association until
1997. EIA has developed several electronic signaling information and physical connection interfaces. It
ceased operation in 2011. One of the notable standards of EIA is serial communication standard RS 232.
Though EIA ceased to function, its function was split into different sectors. One of them is TIA
(Telecommunication Industry Association- accredited by ANSI) that developed standards for
Information and communication technology (ICT) products. The cabling standard EIA/TIA 568 for 8
wire is now known as ANSI/TIA 568 standard.
ETSI (European Telecommunication Standard Institute)
It is a European standardization organization that is independent, non-profit, and works in the
Information and communication technology (ICT) industry. It supports the development and testing of
globally applicable ICT enabled systems, services, and applications. ETSI has members from 66
countries/provinces inside and outside of Europe. ETSI is one of the technical bodies of CEN
(European Committee for Standardization).
3
DATA COMMUNICATION AND NETWORKING
There are several types of protocols and standards used in computer networks, including Transmission
Control Protocol (TCP), Internet Protocol (IP), User Datagram Protocol (UDP) and network standards
such as TCP/IP, HTTP, FTP, among others.
4
DATA COMMUNICATION AND NETWORKING
5
DATA COMMUNICATION AND NETWORKING
Domain Name System (DNS) − DNS is a set of protocols that translates human-readable domain
names into IP addresses used by computers to locate websites and other resources on the internet.
TCP/IP
TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is a set of conventions or
rules and methods that are used to interconnect network devices on the Internet. The internet protocol
suite is commonly known as TCP/IP, as the foundational protocols in the suite are Transmission
Control Protocol and Internet Protocol.
It chooses how the information will be traded over the web through end-to-end communications that
incorporate how the information ought to be organized into bundles (bundles of data), addressed, sent,
and received at the goal. This communication protocol can also be utilized to interconnect organize
devices in a private network such as an intranet or an extranet.
TCP/IP Layers
Application Layer An application layer is the topmost layer within the TCP/IP model. When
one application layer protocol needs to communicate with another application layer, it forwards its
information to the transport layer.
The application layer provides the user interface with which the user interacts with the
network and accesses the services or resources he wants to access.
Remote access, email services, shared databases, NVT (Network Virtual Transmission), DNS (Domain
Name System) are services of the application layer.SSH, TELNET, HTTP/HTTPS, POP, IMAP, SMTP,
FTP, etc. are the protocols used in the application layer.
Transport Layer It is responsible for the reliability, flow control, and correction of data that is
being sent over the network. There are two protocols used in this layer are User Datagram Protocol
and Transmission control protocol.
Different processes are running on different machines, so the transport layer is responsible
for the process-to-process delivery of data between communication devices. Transport Layer
provides responsibilities as follow:
Segmentation and Reassembling: The message sent by the sender is divided into
segments including the sequence number in each segment. When the receiver receives the message, it will
reassemble the message using the sequence numbers correctly.
6
DATA COMMUNICATION AND NETWORKING
Connection control: The transport layer uses two types of connections, the first is TCP
and the second is UDP.
o TCP is used for connection-oriented protocol and hence it guarantees to deliver the
message to the receiver. So, one can say that TCP is reliable.
o UDP is a connectionless protocol and hence it does not give any guarantee of
message delivery to the receiver. So, one can say that UDP is unreliable.
o Sending an email message is an example of TCP, and video streaming is an
example of UDP.
Flow control and Error control: Flow control (flow of data) and Error control (damage
or loss) are performed between processes in the transport layer.
Internet/Network Layer It is the third layer of the TCP/IP Model and also known as the
Network layer. The main responsibility of this layer is to send the packets from any network, and they
arrive at the goal irrespective of the route they take.
The network layer is responsible for the host-to-host delivery of packets. It converts the
segments received from the transport layer into packets. The responsibilities and services of the
network layer are as follows:
Logical addressing: The network layer adds headers to the packet. The NL header
contains the logical address (IP address) of the sender and receiver, allowing for host-to-host delivery
success.
Routing: How our data travels over the network depends on routing. The network layer
uses the router so that the layers below the network layer can also use the functionality of the router.
Network Access Layer It is the lowest layer of the TCP/IP Model. It is the combination of the
Physical Layer and the Data link layer which present in the OSI Model. Its main responsibility is to the
transmission of information over the same network between two devices.
The lowest layer of the OSI reference model is the Physical Layer. It is responsible for the actual
physical connection between the devices. The physical layer contains information in the form
of bits. Physical Layer is responsible for transmitting individual bits from one node to the next. When
receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the
Data Link layer, which will put the frame back together. Common physical layer devices
are Hub, Repeater, Modem, and Cables.
Application/Uses of TCP/IP
Line Configuration
Line configuration refers to the way two or more communication devices attached to a link. Line
configuration is also referred to as connection. A Link is the physical communication pathway that
transfers data from one device to another. For communication to occur, two devices must be connected
in same way to the same link at the same time.
There are two possible line configurations.
Point-to-Point.
Multipoint.
Point-to-Point
A Point to Point Line Configuration Provide dedicated link between two devices use actual length
of wire or cable to connect the two end including microwave & satellite link. Infrared remote control &
tvs remote control.
The entire capacity of the channel is reserved for transmission between those two devices. Most
point-to-point line configurations use an actual length of wire or cable to connect the two ends, but
other options, such as microwave or satellite links, are also possible.
Point to point network topology is considered to be one of the easiest and most conventional
network topologies. It is also the simplest to establish and understand. To visualize, one can consider
point to point network topology as two phones connected end to end for a two way communication
Multipoint Configuration
Multipoint Configuration also known as Multidrop line configuration: one or more than two
specific devices share a single link capacity of the channel is shared.
More than two devices share the Link that is the capacity of the channel is shared now. With
shared capacity, there can be two possibilities in a Multipoint Line Config:
◻ Spatial Sharing: If several devices can share the link simultaneously, its called Spatially shared line
configuration
◻ Temporal (Time) Sharing: If users must take turns using the link, then its called Temporally shared
or Time Shared Line Configuration.
8
DATA COMMUNICATION AND NETWORKING
Topology
The term ―Topology refers to the way in which the end points or stations/computer systems,
attached to the networks, are interconnected. We have seen that a topology is essentially a stable
geometric arrangement of computers in a network. If we want to select a topology for doing
networking.
Depending on the requirement there are different Topologies to construct a network.
Mesh topology.
Star topology.
Tree (Hierarchical)topology.
Bus topology.
Ring topology.
Ring and mesh topologies are felt convenient for peer to peer transmission. Star and tree are more
convenient for client server. Bus topology is equally convenient for either of them.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in point-
to-point connection with every other host or may also have hosts which are in point-to-point connection to
few hosts only.
9
DATA COMMUNICATION AND NETWORKING
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links.
Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus
for every new host n(n-1)/2 connections are required. It provides the most reliable network
structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect
to each other in some arbitrarily fashion. This topology exists where we need to provide
reliability to some hosts out of all.
Advantages:
They use dedicated links so each link can only carry its own data load. So traffic problem can be
avoided.
It is robust. If any one link get damaged it cannot affect others
It gives privacy and security
Fault identification and fault isolation are easy.
Disadvantages:
The amount of cabling and the number IO ports required are very large. Since every device is
connected to each other devices through dedicated links.
The sheer bulk of wiring is larger then the available space
Hardware required to connect each device is highly expensive.
Example:
A mesh network has 8 devices. Calculate total number of cable links and IO ports needed.
Solution:
Number of devices = 8 Number of links = n (n-1)/2
= 8(8-1)/2
= 28
Number of port/device = n-1
= 8-1 = 7
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-to-
point connection. That is, there exists a point to point connection between hosts and hub.
Each computer on a star network communicates with a central hub that resends the message either
to all the computers. (In a broadcast network) or only the destination computer. (In a switched
network). Ethernet 10 base T is a popular network based on the star topology.
Here each device has a dedicated link to the central „hub‟. There is no direct traffic between devices.
10
DATA COMMUNICATION AND NETWORKING
The transmission are occurred only through the central controller namely hub.
Advantages:
Less expensive then mesh since each device is connected only to the hub.
Installation and configuration are easy.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network
is bifurcated into three types of network devices. The lowermost is access-layer where computers are
attached.
The middle layer is known as distribution layer, which works as mediator between upper layer and
lower layer. The highest layer is known as core layer, and is central point of the network, i.e. root of the
tree from which all nodes fork.
All neighbouring hosts have point-to-point connection between them. Similar to the Bus topology, if
the root goes down, then the entire network suffers even. though it is not the single point of failure.
11
DATA COMMUNICATION AND NETWORKING
Every connection serves as point of failure, failing of which divides the network into unreachable
segment.
Advantages:
Can connect more than star.
The distance can be increased.
Can isolate and prioritize communication between different computers
Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus topology may
have problem while multiple hosts sending data at the same time.
Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master
to solve the issue. It is one of the simple forms of networking where a failure of a device does not affect
the other devices. But failure of the shared communication line can make all other devices stop
functioning.
Advantages:
Ease of installation.
Less cabling.
Disadvantages:
Difficult reconfiguration and fault isolation.
Difficult to add new devices.
Signal reflection at top can degradation in quality
If any fault in backbone can stops all transmission.
Ring topology
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send message to a host which is not adjacent
to it, the data travels through all intermediate hosts. To connect one more host in the existing
structure,the administrator may need only one more extra cable.
12
DATA COMMUNICATION AND NETWORKING
Advantages:
Easy to install.
Easy to reconfigure.
Fault identification is easy.
Disadvantages:
Unidirectional traffic.
Break in a single ring can break entire network.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may contain
attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-
Ring topology and networks connected to them are mostly Star topology networks. Internet is the best
example of largest Hybrid topology
Transmission Mode
Transferring modes refer to the process of transferring data from one point to the other point or device
over a particular network. The Channel between the two devices can be buses or networks. The
communication channel between the two points includes an optical fiber cable, wireless communication,
and a copper wired channel. These data are transferred between the devices using Electro Magnetic
waves.The transmission is characterized by:
13
DATA COMMUNICATION AND NETWORKING
The direction of the exchanges
The transmission mode: the number of bits sent simultaneously
Synchronization between the transmitter and receiver
Simplex Mode:
In Simplex mode, the communication is unidirectional, Data is transmitted from one device to
another device. Only one of the two devices on a link can transmit, the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one direction.
Example
Mouse and Monitor Interaction: When using a computer, the mouse transmits data to the monitor,
displaying the cursor's movement. However, the monitor does not send any feedback or response back to
the mouse, illustrating a one-way communication flow.
Television Broadcasting: In Television broadcasting, the broadcasters send the data in the form of
signals but from the receiver end no signal is sent back.
14
DATA COMMUNICATION AND NETWORKING
Example:
Walkie-Talkie is a Half-Duplex device. In this, the person in location A transfers their data in the
form of voice and the person receiver end waits for the data to reach. Then only the other person can
send or reply to the data we received from the sender again.
USB 2.0 (Universal Serial Bus) supports half-duplex communication.
Full-Duplex Mode:
Duplex mode is the transmission of data between two devices simultaneously. It is a two-way
communication. The Sender can send and receive the data from the other end device simultaneously. In
this the carrier or the bus need not wait for the other device, it can send/receive the data simultaneously.
Example:
In MODEM we send and receive the information at the same time.
Telephone or mobile communication helps people on both ends to talk simultaneously.
Classification of Network
A Computer network is a system that connects many independent computers to share
information (data) and resources. The integration of computers and other different devices allows
users to communicate more easily.
A computer network is a collection of two or more computer systems that are linked together. A
network connection can be established using either cable or wireless media.
Types of Computer Networks
15
DATA COMMUNICATION AND NETWORKING
A Personal Area Network (PAN) is smallest network which is very personal to a user. This may include
Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters.
PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless
printers and TV remotes.
For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8 devices
connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single administrative system is
generally termed as Local Area Network (LAN). Usually,LAN covers an organization’ offices, schools,
colleges or universities. Number of systems connected in LAN may vary from as least as two to as much
as 16 million.
LAN provides a useful way of sharing the resources between end users.The resources such as printers,
file servers, scanners, and internet are easily sharable among computers.
LANs are composed of inexpensive networking and routing equipment. It may contains local servers
serving file storage and other locally shared applications. It mostly operates on private IP addresses and
does not involve heavy routing. LAN works under its own local domain and controlled centrally.
16
DATA COMMUNICATION AND NETWORKING
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology
and uses Star topology, while Token-ring is rarely seen.
The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV
network. It can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their
Local Area Networks. For example, MAN can help an organization to connect all of its offices in a city.
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area
Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet.
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and
Synchronous Optical Network (SONET). WAN may be managed by multiple administration.
OSI Model
OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical medium to the
software application in another computer.
OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is
now considered as an architectural model for the inter-computer communications.
17
Layers of OSI Model
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer
Application Layer:
The application layer provides the user interface with which the user interacts with the
network and accesses the services or resources he wants to access.
Remote access, email services, shared databases, NVT (Network Virtual Transmission),
DNS (Domain Name System) are services of the application layer.
SSH, TELNET, HTTP/HTTPS, POP, IMAP, SMTP, FTP, etc. are the protocols used in the
application layer.
Presentation Layer:
Data translation, data encryption, and data compression are the responsibilities of the
presentation layer. It also takes care of the syntax and semantics of the data exchanged between the
two devices.
Translation: Using translation, the message is translated from human-readable format to
computer-readable format. In short, the data is converted into a stream of bits because the computer
understands the only binary language.
Encryption: Once the data translation is complete, the data will be encrypted to protect it
from unauthorized access.
18
Data Compression: After the data encryption is completed, the data compression
algorithm will be used to compress the data. Because compressed data is transmitted faster than the
DATA COMMUNICATION AND NETWORKING
original data.
Session Layer:
The session layer provides two main responsibilities which are dialog control and
synchronization.
Dialog Control: Basically, Dialog Control provides two ways for the system to
communicate. They are half-duplex and full-duplex.
o Half Duplex: When two devices communicate, only one device can send or receive
messages at a time.
o Full Duplex: It means bidirectional communication. Communication devices can
send or receive messages at the same time.
Synchronization: The session layer adds checkpoints or synchronization points in data.
o For example, if a device is sending a 4000 pages file, it is good to have checkpoints
after every 200 pages. When 200 pages are received on the receiving side, an acknowledgment will be
given by the receiver to the sender.
o Now, let’s say the transmission crashed on page 1267, then instead of sending the
entire file from the beginning, the system would check checkpoint 1201 and retransmit from page
1201.
Transport Layer
Different processes are running on different machines, so the transport layer is responsible for
the process-to-process delivery of data between communication devices. Transport Layer provides
responsibilities as follow:
Segmentation and Reassembling: The message sent by the sender is divided into
segments including the sequence number in each segment. When the receiver receives the message, it will
reassemble the message using the sequence numbers correctly.
Connection control: The transport layer uses two types of connections, the first is TCP
and the second is UDP.
o TCP is used for connection-oriented protocol and hence it guarantees to deliver the
message to the receiver. So, one can say that TCP is reliable.
o UDP is a connectionless protocol and hence it does not give any guarantee of
message delivery to the receiver. So, one can say that UDP is unreliable.
o Sending an email message is an example of TCP, and video streaming is an
example of UDP.
19
Flow control and Error control: Flow control (flow of data) and Error control (damage
or loss) are performed between processes in the transport layer.
DATA COMMUNICATION AND NETWORKING
Network Layer
The network layer is responsible for the host-to-host delivery of packets. It converts the
segments received from the transport layer into packets. The responsibilities and services of the
network layer are as follows:
Logical addressing: The network layer adds headers to the packet. The NL header
contains the logical address (IP address) of the sender and receiver, allowing for host-to-host delivery
success.
Routing: How our data travels over the network depends on routing. The network layer
uses the router so that the layers below the network layer can also use the functionality of the router.
The data link layer is responsible for converting packets received from the network layer into
frames. It is also responsible for hop-to-hop delivery. The responsibilities of the data link layer are as
follows:
1. Framing
2. MAC address
3. Flow and Error control
4. Access control
Physical Layer
The lowest layer of the OSI reference model is the Physical Layer. It is responsible for the
actual physical connection between the devices. The physical layer contains information in the form
of bits. Physical Layer is responsible for transmitting individual bits from one node to the next. When
receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the
20
DATA COMMUNICATION AND NETWORKING
Data Link layer, which will put the frame back together. Common physical layer devices
are Hub, Repeater, Modem, and Cables.
Line Configuration: It defines the way how two or more devices can be connected physically.
Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or full-duplex
mode between the two devices on the network.
Topology: It defines the way how network devices are arranged.
Signals: It determines the type of the signal used for transmitting the information.
Unit – I Questions
Two Marks
1. What is meant by Data Communication and explain its characteristics?
2. What are the components of Data communication?
3. Explain different Data flow directions.
4. Define Line Configuration?
5. Write about different types of connections.
6. Write the layers of OSI model?
Five Marks
1. Explain different types of topologies.
2. Explain different types of Networks.
3. Write about Protocol and Standards.
Ten Marks
1. Explain different layers in OSI Model.
2. Explain the layers of TCP/IP model.
21
DATA COMMUNICATION AND NETWORKING
22