Unit-1 (Part-A)
Unit-1 (Part-A)
BY :- NEERJA ARORA
Unit-1: Introductory Concepts
Data communications are the exchange of data between two devices via some form of transmission
medium such as a wire cable.
Here, the word data refers to information presented in the form that is agreed upon by
the parties creating and using the data.
NETWORKS
A network must be able to meet a certain number of criteria. The most important of these
are:-
1. Performance
It can be measured in many ways
transit time
response time.
the number of users
the type of transmission medium
the capabilities of the connected hardware, and the efficiency of the software.
2. Accuracy. The system must deliver the data accurately to the correct destination. Data that have been
altered in transmission and left uncorrected are unusable.
3. Robustness ability of a network to maintain its structural integrity and continue to operate its original
functions normally even after being attacked,
4. Reliability It is measured by the frequency of failure, the time it takes a link to recover from a failure.
5. Security Network security issues include protecting data from unauthorized access, protecting data
from damage and development, and implementing policies and procedures for recovery from breaches
and data losses.
Categories of
Networks
Examples of PAN: cordless mice, wireless keyboards, and Bluetooth music systems.
Advantages of PAN
• PAN is relatively flexible and provides high
efficiency for short network ranges.
Dis-Advantages of PAN
• It needs easy setup and relatively low cost.
• It does not require frequent installations and • Low network coverage area/range.
maintenance • Limited to relatively low data rates.
• It is simple and portable. • Devices are not compatible with each other.
• Needs fewer technical skills to use. • Inbuilt WPAN devices are a little bit costly
2. Local Area Network (LAN)
A metropolitan area network (MAN) is a computer network that connects computers within a metropolitan
area, which could be a single large city, multiple cities and towns, or any given large area with multiple
buildings.
This type of network is larger than a LAN but smaller than WAN.
Depending upon the type of configuration, this network has coverage area from several miles to tens of miles
(maximum 50 km range)
The fault tolerance of a MAN is less and also there is more congestion in the network than LANs.
It is costly and may or may not be owned by a single organization.
The data transfer rate and the propagation delay of MAN are moderate. i.e. (from 1 gigabit per second to 100
Gbps).
Devices used for transmission of data through MAN are Modem and Wire/Cable.
Examples of a MAN are the part of the telephone company network that can provide a high-speed DSL line to
Wide Area Network (WAN) –
WAN is a computer network that extends over a large geographical area, that may comprise a
country, a continent, or even the whole world.
A (WAN) is a collection of local-area networks (LANs) or other networks that communicate with
one another via telephone lines and radio waves
WAN may be limited to an enterprise (a corporation or an organization) or accessible to the public.
Any organization can form its global integrated network using WAN.
WAN technology is having high speed and relatively expensive.
Communication medium used for WAN is PSTN or Satellite Link.
Due to long-distance transmission, the noise and error tend to be more in WAN.
A WAN can be as complex as
the backbones that connect the
Internet , referred as switched
WAN.
or as simple as a dial-up line
that connects a home computer
to the Internet, referred as a
point-to-point WAN.
THE INTERNET
There are -
international service providers,
national service providers,
regional service providers, and
local service providers.
Network Devices and Components
Disadvantages of Repeaters
• Repeaters cannot connect dissimilar networks.
• Sometimes, they cannot differentiate between actual signal and noise.
• They cannot reduce network traffic or congestion.
• Most networks have limitations upon the number of repeaters that can be deployed.
Bridge –
Limitations
Switches can be subject to distributed denial of service (DDoS) attacks;
Router
A gateway, as the name suggests, is a passage to connect two networks that may work
upon different networking models.
They work as messenger agents that take data from one system, interpret it, and
transfer it to another system.
Gateways are generally more complex than switches or routers.
Gateways perform all of the functions of routers and more.
In fact, a router with added translation functionality is a gateway. The function that
does the translation between different network technologies is called a protocol
converter.
Gateways operates at network layer.
Modem
A communication subsystem/network is a combination of hardware and software that sends data from
one location to another.
The hardware consists of the physical equipments that carries signals from one point of the
network to another.
The software consists of instruction sets that make possible the services that we expect from a
network.
Early, the implementation of software for such subsystems were based on single, complex, unstructured
program with many interacting components. The resultant software was very difficult to test and modify.
To overcome such problems, the ISO has developed a layered approach. In a layered approach,
networking concept is divided into several layers, and each layer is assigned a particular task.
Therefore, we can say that networking tasks depend upon the layers.
Layered Network Architecture
The main aim of the layered architecture is to divide the design into small pieces/layers.
Each lower layer adds its services to the higher layer to provide a full set of services to manage
communications and run the applications.
It provides modularity and clear interfaces, i.e., provides interaction between subsystems.
It ensures the independence between layers by providing the services from lower to higher layer without
defining how the services are implemented. Therefore, any modification in a layer will not affect the other
layers.
The number of layers, functions, contents of each layer will vary from network to network. However,
the purpose of each layer is same i.e. to provide the service to a higher layer and hiding the details from
the layers of how the services are implemented.
Consider an Example: Two friends
communicating through postal mail .
The process of sending a letter to a
friend is also a layered task in which
upper layers uses the services of lower
layer i.e. post office.
The basic elements of layered architecture are : services, protocols, and interfaces.
In a n-layer architecture, layer n on one machine will have a communication with the
layer n on another machine through lower layers and the rules used in a conversation are known
as a (layer-n protocol).
Network Models
OSI stands for Open System Interconnection is a reference model that describes how information from a
software application in one computer moves through a physical medium to the software application in
another computer.
developed by ISO in 1984, and allows any two different systems to communicate regardless of their
underlying architecture(h/w and s/w).
It is a model for understanding and designing a network architecture that is flexible, robust, and
interoperable
OSI consists of seven layers, and each layer performs a particular network function.
OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a
particular task.
Each layer is self-contained, so that task assigned to each layer can be performed independently.
Functions of each layer in the OSI model
Application layer
The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and is responsible for providing services to the users.
It handles issues such as network transparency, resource allocation, etc.
Specific services provided by the application layer :
Network virtual terminal. A network virtual terminal is a software version of a physical terminal, and it
allows a user to log on to a remote host. To do so, the application creates a software emulation of a terminal
at the remote host.
File transfer, access, and management. This application allows a user to access files in a remote host (to
make changes or read data), to retrieve files from a remote computer for use in the local computer, and to
manage or control files in a remote computer locally.
Mail services. This application provides the basis for e-mail forwarding and storage.
Directory services. This application provides distributed database sources and access for global
information about various objects and services.
Presentation Layer
The presentation layer is concerned with
the syntax and semantics of the
information exchanged between two
systems.
The presentation layer is responsible for
translation, encryption and compression.
Specific responsibilities of the presentation layer:
Translation. As different computers use different encoding systems, the presentation layer is responsible for
interoperability between these different encoding methods. The presentation layer at the sender changes the
information from its sender-dependent format into a common format and The presentation layer at the receiving
machine changes the common format into its receiver-dependent format.
Encryption. To carry sensitive information, a system must be able to ensure privacy. Encryption means that the
sender transforms the original information to another form and sends the resulting message out over the network.
Decryption reverses the original encryption process to transform the message back to its original form.
Compression. Data compression reduces the number of bits contained in the information. Data compression
becomes particularly important in the transmission of multimedia such as text, audio, and video.
Session Layer
For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to
ensure that each 100-page unit is received and acknowledged independently. In this case, if a crash happens during
the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages
previous to 501 need not be resent.
Transport Layer