0% found this document useful (0 votes)
17 views69 pages

Chapter 1

The document provides an introduction to data communication and computer networks. It discusses concepts like communication models, protocols, network architectures, and standard models like OSI and TCP/IP. It describes the layers of the OSI model and their functions. The document also covers topics like network topologies, connections, and encapsulation in data transmission.

Uploaded by

Abel Bezabih
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views69 pages

Chapter 1

The document provides an introduction to data communication and computer networks. It discusses concepts like communication models, protocols, network architectures, and standard models like OSI and TCP/IP. It describes the layers of the OSI model and their functions. The document also covers topics like network topologies, connections, and encapsulation in data transmission.

Uploaded by

Abel Bezabih
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 69

Data Communication and Computer Networks

[ECEg4191]

Chapter 1

Introduction

Machine Learning Based Network Layer Attack De


tection System in MANET
Outlines
2

● Concept of Communication
● Communication Model
● Protocols and Architectures
● OSI Model
● TCP/IP
Evolution of data communications & networking
3

1. Growth of communication traffic


 Voice and data traffic
 Challenges (to the network service providers):

2. Development of new services

3. Advances in technology
 Networks are more intelligent: quality of service (QoS)
 Internet, Web, intranets, extranets, etc.
 Pervasive computing/ubiquitous computing
Cont’
4

What networking services do we use today?

 Phone service for voice


 Internet service for data
Motivation: Sending a letter
5

Mr. X flow of information Ms. Y

Mr. X’s Ms. Y’s


mailbox mailbox

Postman
Communication Technology
6

Twitter
voice mail

instant
e-mail messaging chat rooms

telephony videoconferencing
newsgroups

collaboration GPS
Concepts of Communication
7

 Telecommunication means communication at a distance.

 Data Communication is the exchange of data (in the form of 0’s

and 1’s) between two nodes via some form of the transmission
medium.
Transmission medium are:
 Wireless (eg. air)
 Wired (eg. cable)
 A node is any devices like computer, printer, mobile and so on.
Data communication network requirements
8

 Performance: Response time, number of users,


transmission speed, media type and others.
 Consistency: Predictable response time, accurate (no data

loss).
 Reliability: Average time between failures and recovery

after failure.
Cont’
9

 Security: Unauthorized access to hardware and software.

 Applications: Should support easy application (email,

teleconferencing, etc.).
Cont’
10

 In order to transfer a data from one node to another node,

network should be established.


 A network is a set of nodes connected by communication

links.
 A node can able to send or receive data generated by other

nodes on the network.


Data Flow
11

Simplex (one way street)


 The communication is unidirectional
 Only one device on a link can transmit; the other can
only receive
 Use the entire capacity of the channel to send data
 Example: Keyboards, Monitors, Television

Data
Cont’
12

Half-Duplex (one-lane with two-directional traffic)


 Each station can both transmit and receive, but not at
the same time
 When one device is sending, the other can only receive,
and vice versa
 The entire capacity of a channel is taken over by the
transmitting device
 Example: Walkie-talkies

Data

Data
Cont’
13

Full-Duplex (two-way street)


 Both stations can transmit and receive at same time
 Signals going in either direction sharing the capacity of
the link
 Sharing can occur in two ways:
 Link has two physically separate transmission paths
 One for sending and the other for receiving
 The capacity of the channel is divided between signals
travelling in both directions
Cont’
14

Example: Telephone network

Data Data
Communication Model
15

 What is the purpose of communications?

 How human communication?

 A transmitter: mouth

 A receiver: ear

 The media: air

 The protocol: a common human language


Communication Model
16

 How device communications?

Communication model- Block diagram


Key elements of Communication model
17

Source: Generates data to be transmitted.


Transmitter: Converts data into transmittable signals.
Transmission System: Carries data from source to
destination.
Receiver: Converts received signal into data.
Destination: Takes incoming data.
Components of data communication system
18

A data communication system is made up of five

components:
 Message

 Sender
 Receiver

 Medium

 Protocol
Cont’
19

Message: Information or data to be sent.

 Anything that can be represented using binary bits.

 Can be text, numbers, video or any other forms.

Sender: A node that sends the data message.

 Can be a Computer , Workstation, Video camera, etc.


Cont’
20

Receiver: A node that receives the message (a

computer, workstation, Television etc.).

Medium: Physical path that a message uses to travel

from the sender to the receiver.

Eg. Copper Cable, Coaxial Cable, Fiber Optic Cable,

Wireless Medium, etc.


Protocol
21

 A protocol is a set of rules that govern data communications.

 It determines:

 What is communicated

 How it is communicated

 When it is communicated

 Without protocol, two devices may be connected but they will

not be able to communicate.


Elements of Protocol
22

Syntax: Concerns the format of the data blocks.


 Indicates how to read the bits

Semantics: Interprets the meaning of the bits.


 Includes control information and error handling.

Timing: When data should be sent and what.


 Includes speed matching and sequencing.
Protocols and Architectures: The need
23

 The source must either activate the direct data

communication path or inform the communication network

of the identity of the destination.

 The source must determine the destination to receive data.

 The file transfer application on the source system must

determine the file management program on the destination.

 Perform a format translation function.


Cont’
24

A Network Architecture is a structured set of protocols

that implement the exchange of information between


computers.
In a Layered Network Architecture, the services are

grouped in a hierarchy of layers.


 A protocol of layer N uses only services of layer N-1.
 A protocol of layer N provides services only to layer N+1.
Physical structure of the network
25

Type of Connection

 Point to Point - single transmitter and receiver


 Multipoint - multiple recipients of single transmission
Physical Topology

 Ways of connection of devices- star, bus, ring and mesh.


 Type of transmission - unicast, multicast and broadcast.
Types of connections: point-to-point and multipoint
26
Connection of devices- Mesh topology
27
Connection of devices- Star topology
28
Connection of devices- Bus topology
29
Connection of devices- Ring topology
30
Connection of devices- Hybrid
31

Hybrid Topology
 Example: having a main star topology with each branch
connecting several stations in a bus topology
Standardized Protocol Architectures
32

• Required for devices to communicate.

• Vendors have more marketable products.

• The two common protocol standards:

OSI Reference model

TCP/IP protocol suite


OSI Reference model
33

 The Open Systems Interconnection (OSI) reference model

was developed by the International Organization for


Standardization (ISO).
 It is a framework for developing protocol standards.

 It has seven layers


Cont’
34

 Each layer performs a subset of the required communication

functions.
 Each layer relies on the next lower layer to perform more

primitive functions.
 Each layer provides services to the next higher layer.

 Changes in one layer should not require changes in other

layers.
The Seven Layers
35
Interaction of layers in OSI model
36
OSI Layers with Encapsulation
37
Source-to-Destination delivery
38
Cont’
39

Application Layer:
 Applications provide away to create a message.

 Application layer protocols provide the rules and formats

that govern how data is treated.


 Applications provide human interface.

 Some applications like web browsers are network aware.

 Example: File Transfer, Electronic Mail.


Cont’
40

Presentation layer:
 Provides data interfaces, data compression and
translation between different data formats
(syntax).
 Formats data for presentation to the user
(Encryption/decryption)
Cont’
41

Session Layer:
Provides the control structure for communication

between applications.
Initiates, manages, and terminates connections

(sessions) between sender and receiver.


Example: RPC
Cont’
42

Transport Layer:
 Provides reliable and transparent transfer of data
between end points.
Provides end-to-end error recovery and flow control.

Covers the end-to-end exchange of data.

Concerned with providing reliable delivery of data.


Common layer shared by all applications.
Cont’
43

Transport layer protocols: TCP and UDP


TCP (Transmission Control Protocol) is the transport layer

protocol for most applications.

Provides a reliable connection for transfer of data between

applications.

A TCP segment is the basic protocol unit.

TCP tracks segments between entities for duration of each

connection.
Cont’
44

UDP is an alternative to TCP in the TCP/IP Suite.

Send messages with minimum protocol overhead.

Does not guarantee delivery, preservation of

sequence, or protection against duplication.


Adds port addressing capability to IP.
Cont’
45

Network Layer: Responsible for establishing and terminating


connections.

 Major duties of the network layer are:

Logical addressing: If a packet passes from one network to

another, the network layer adds an header to the packet

containing the logical addresses of the sender and receiver.

Routing: When independent networks are connected together

the connecting devices , route packets to their final destination.


Cont’
46

Data Link Layer:


Provides for the reliable transfer of information across the

physical link.
The major duties of the data link layer are :

Framing: Divide the stream of bits received from the network


layer into frames.
Physical addressing: The header is added to the frame to
define the sender/receiver of the frame.
Cont’
47

Flow control: Prevents data congestion or overwhelming


(overcrowding)the receiver.
Error control: The trailer adds mechanisms to detect and
retransmit damaged or lost frames.
Access control: Determines which device has control over a
shared link.
Cont’
48

Physical Layer:
 Concerned with transmission of unstructured bit stream

over physical medium.


Deals with the mechanical, electrical, functional, and

procedural characteristics to access the physical medium.


The major duties of this layer are:
 Representation of bits, data rate (transmission rate) and

Synchronization of bits.
TCP/IP Suite
49

 However, many protocols have been developed in the context

of OSI, the TCP/IP architecture has come to dominated and

widely used.

 It is the protocol architecture of the Internet


Cont’
50

The TCP/IP suite has the following layers:


 Application

 Transport

 Internet

 Network access

 Physical
Questions
51

1. Data can be transferred from one computer to the


other computer in the form of___________?
A. Bits
B. Packets
C. Frames
D. Segments
Questions
52

2. Which topology use less cabling? Why?


A. Bus
B. Star
C. Ring
D. Mesh
Questions
53

3. Which topology is more secure ? Why?


A. Bus
B. Star
C. Ring
D. Mesh
Questions
54

4. While selecting a topology, what considerations should be


considered?
Questions
55

5. For mesh topology if number of devices are 20.


Find the following:
A. Number of links per device
B. Number of total simplex links
C. Number of total duplex links
D. Number of total I/O ports for each devices
Summery- Bus Topology
56

 Use one central BUS (shared)


 Less cabling
 Data collisions
 Slow network
 Less fault tolerance
 Less computers can accommodate

Example: LAN
Summery- Star Topology
57

 Broadcast or unicast frames based on the central device.


 Broadcast: for all connected device(if Hub is used)
 Unicast: only for target device(if Switch is used)
 Good fault tolerance
 Less expensive than mesh topology
 Easy to reconfigure
 Easy fault detection
 Less computers count

Example: High speed LAN


Summery- Ring Topology
58

 Easy installation
 Less cabling
 Easy to troubleshoot
 Difficult to reconfigure
 Slow transmission( because communication is in circular
fashion)

Example: Token Ring


Summery- Mesh Topology
59

If number of devices are n


Number of links per device is= n-1
Number of total simplex links= n(n-1)
Number of total duplex links= n(n-1)/2
Number of total I/O ports for each devices= n-1
Good fault tolerance
Good security
Expensive
Difficult to install
Example: Interconnection of regional telephone offices.
Summery on OSI model- Application layer
60

Used by network applications


 Network application means computer applications used
internet.
 Example: Google chrome , Firefox, Skype, Outlook
 These applications are work by different protocols
Example:
 File transfer- FTP is used
 Web surfing- HTTP/S is used
 Emails-SMTP is used
 Virtual terminal-Telnet is used
Summery on OSI model- Presentation layer
61

Activities on the this layer are the following:

 Translation: ASCII to Binary


 Data compression: reducing size
 Encryption/decryption: To maintain data integrity
(e.g SSL) protocol)
Summery on OSI model- Session layer
62

Main tasks by this layer are:

 Session management
 Authentication
 Authorization

 Use APIs:

 Allows to communicate devices each other.


Example: NetBIOS
Summery on OSI model- Transport layer
63

Main Tasks:
 Segmentation: dividing data in to small data units called

segments.
 Flow control: Control the amount of data to be

transmitted.
 Error control: automatic repeat request if data is missing.

Segment= port numbers +sequence numbers + headers


Cont’
64

The two protocols


TCP:
 Connection oriented transmission
 Because of feedback, it has slow transmission
Example: WWW, FTP, Email

UDP:
 Connection less transmission
 Transmission is faster than TCP because there is no feedback.
Example: video, game, VOIP,DNS,TFTP and others
Summery on OSI model- Network layer
65

Main Tasks:
 Logical addressing: Based on IPV4 and IPV6, IP address is

used.
 Routing: a method to move packets from source to

destination
 Path determination: the process of choosing best path for

data delivery from source to destination.


Packet= IP addresses + segment
Cont'
66

The following protocols are used to determine the

best path.
 OSFP: open short first protocol

 BGP: boarder gateway protocol

 IS-IS: intermediate system to intermediate system


Summery on OSI model- Data link layer
67

Main Tasks:
Media Access Control(MAC):
 Control how the data is placed and received from the media.

Framing:
 Accessing the media.

 MAC address is used.

 MAC address is 12 digit alpha-numeric number that embedded on

the NIC by the manufacturer.

Frame=MAC addresses+ IP addresses + Segment + Tail


Summery on OSI model- Physical layer
68

At physical layer:
Bits are converted in to signals and

The signal is transmitted via transmission medium.


69

Chapter one ended!

Chapter-2 >>

You might also like