DCN Unit-01
DCN Unit-01
2. Sender. The sender is the device that sends the data message. It can be a computer, workstation,
telephone handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer, workstation,
telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-
optic cable, and radio waves.
5. Protocol. A protocol is a set of rules that govern data communications. It represents an agreement
between the communicating devices. Without a protocol, two devices may be connected but not
communicating, just as a person speaking French cannot be understood by a person who speaks only
Japanese.
Network and Networking
• A network is a set of devices (often referred to as nodes) connected by
communication links.
• A node can be a computer, printer, or any other device capable of sending
and/or receiving data generated by other nodes on the network.
• A protocol defines what is communicated, how it is communicated, and when it is communicated. The key
elements of a protocol are syntax, semantics, and timing.
o Syntax. The term syntax refers to the structure or format of the data, meaning the order in which they are
presented. For example, a simple protocol might expect the first 8 bits of data to be the address of the
sender, the second 8 bits to be the address of the receiver, and the rest of the stream to be the message
itself.
o Semantics. The word semantics refers to the meaning of each section of bits. How is a particular pattern
to be interpreted, and what action is to be taken based on that interpretation? For example, does an address
identify the route to be taken or the final destination of the message?
o Timing. The term timing refers to two characteristics: when data should be sent and how fast they can be
sent. For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps,
the transmission will overload the receiver and some data will be lost.
Standards
Standards are essential in creating and maintaining an open and competitive market for
equipment manufacturers and in guaranteeing national and international interoperability of
data and telecommunications technology and processes.
• In 1972, Vint Cerf and Bob Kahn, both of whom were part of the core ARPANET group,
collaborated on what they called the Internetting Projec1. Cerf and Kahn's landmark
1973 paper outlined the protocols to achieve end-to-end delivery of packets. This
paper on Transmission Control Protocol (TCP) included concepts such as
encapsulation, the datagram, and the functions of a gateway.
Internet
• It is made up of many wide- and local-area networks joined by connecting
devices and switching stations.
• It is difficult to give an accurate representation of the Internet because it
is continually changing-new networks are being added, existing networks
are adding addresses, and networks of defunct companies are being
removed.
• Today most end users who want Internet connection use the services of
Internet service providers (lSPs). There are international service providers,
national service providers, regional service providers, and local service
providers.
• The Internet today is run by private companies, not the government.
National ISP
National Internet Service Providers The national Internet service providers are
backbone networks created and maintained by specialized companies.
There are many national ISPs operating in North America; some of the most well
known are SprintLink, PSINet, UUNet Technology, AGIS, and internet Mel.
To provide connectivity between the end users, these backbone networks are
connected by complex switching stations (normally run by a third party) called
network access points (NAPs).
Some national ISP networks are also connected to one another by private switching
stations called peering points. These normally operate at a high data rate (up to
600 Mbps).
Internet Service Provider
Regional & Local ISP
• Regional Internet Service Providers Regional internet service providers or regional ISPs
are smaller ISPs that are connected to one or more national ISPs. They are at the third
level of the hierarchy with a smaller data rate.
• Local Internet Service Providers Local Internet service providers provide direct service
to the end users. The local ISPs can be connected to regional ISPs or directly to national
ISPs. Most end users are connected to the local ISPs. Note that in this sense, a local ISP
can be a company that just provides Internet services, a corporation with a network that
supplies services to its own employees, or a nonprofit organization, such as a college or
a university, that runs its own network. Each of these local ISPs can be connected to a
regional or national service provider.
Internet Service Provider
Open System Interconnection (OSI Layers)
OSI Reference Model
Open System Interconnection (OSI Layers)
Open System Interconnection (OSI Layers)
1.PHYSICAL LAYER: It is responsible for the actual physical connection between the devices(converts
flowing data in form of 0’s and 1’s).
2.DATA LINK LAYER: It is responsible for node to node delivery of the message. Its function is to make sure
that the data is error free
3.NETWORK LAYER: It is responsible for the transmission of data from one host to the other location by
selecting the shortest path.
4.TRANSPORT LAYER: It provides services to application layer and takes services from network layer. It is
responsible for the end to end delivery of the complete message.
5.SESSION LAYER: This layer is responsible for establishment of connection, maintenance of sessions,
authentication and also ensures security.
6.PRESENTATION LAYER: The data from the application layer is processed here as per the required format
to transmit over the network.
7.APPLICATION LAYER: This layer produces the data which has to be transferred over the network.
1. Physical Layer (OSI Layers)
Functions of the Physical Layer
•Bit synchronization: The physical layer provides the synchronization of the bits by providing a
clock. This clock controls both sender and receiver thus providing synchronization at the bit level.
•Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits sent per
second.
•Physical topologies: Physical layer specifies how the different, devices/nodes are arranged in a
network i.e. bus, star, or mesh topology.
•Transmission mode: Physical layer also defines how the data flows between the two connected
devices. The various transmission modes possible are Simplex, half-duplex and full-duplex.
Note: Hub, Repeater, Modem, and Cables are Physical Layer devices.
Network Layer, Data Link Layer, and Physical Layer are also known as Lower Layers or Hardware
Layers.
Network Devices
HUB
2. Data Link Layer (OSI Layers)
• The data link layer is responsible for the node-to-node delivery of the message. The main
function of this layer is to make sure data transfer is error-free from one node to another, over
the physical layer.
• When a packet arrives in a network, it is the responsibility of the DLL to transmit it to the Host
using its MAC address.
• The packet received from the Network layer is further divided into frames depending on the
frame size of the NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s
MAC address in the header.
• The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol)
request onto the wire asking “Who has that IP address?” and the destination host will reply with
its MAC address.
2. Data Link Layer (OSI Layers)
Functions of the Data Link Layer
•Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits
that are meaningful to the receiver. This can be accomplished by attaching special bit patterns to the beginning
and end of the frame.
•Physical addressing: After creating frames, the Data link layer adds physical addresses (MAC addresses) of
the sender and/or receiver in the header of each frame.
•Error control: The data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
•Flow Control: The data rate must be constant on both sides else the data may get corrupted thus, flow
control coordinates the amount of data that can be sent before receiving an acknowledgment.
•Access control: When a single communication channel is shared by multiple devices, the MAC sub-layer of
the data link layer helps to determine which device has control over the channel at a given time.
Note:
Switch & Bridge are Data Link Layer devices.
Packet in the Data Link layer is referred to as Frame.
Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host machines.
3. Network Layer (OSI Layers)
• The network layer works for the transmission of data from one host to the other located in different
networks.
• It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from
the number of routes available.
• The sender & receiver’s IP addresses are placed in the header by the network layer.
• At the sender’s side: The transport layer receives the formatted data from the upper layers,
performs Segmentation, and also implements Flow & Error control to ensure proper data
transmission.
• It also adds Source and Destination port numbers in its header and forwards the segmented
data to the Network Layer.
4. Transport Layer (OSI Layers)
Functions of the Transport Layer
• Segmentation and Reassembly: This layer accepts the message from the (session) layer, and
breaks the message into smaller units. Each of the segments produced has a header associated
with it. The transport layer at the destination station reassembles the message.
• Service Point Addressing: To deliver the message to the correct process, the transport layer
header includes a type of address called service point address or port address. Thus by
specifying this address, the transport layer makes sure that the message is delivered to the
correct process.
4. Transport Layer (OSI Layers)
Services Provided by Transport Layer
1.Connection-Oriented Service
2.Connectionless Service
2. Connectionless service: It is a one-phase process and includes Data Transfer. In this type
of transmission, the receiver does not acknowledge receipt of a packet. This approach allows
for much faster communication between devices. Connection-oriented service is more reliable
than connectionless Service.
5. Session Layer (OSI Layers)
This layer is responsible for the establishment of connection, maintenance of sessions,
authentication, and also ensures security.
•Session establishment, maintenance, and termination: The layer allows the two processes
to establish, use and terminate a connection.
•Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the error so
that the data is re-synchronized properly, and ends of the messages are not cut prematurely and
data loss is avoided.
•Dialog Controller: The session layer allows two systems to start communication with each
other in half-duplex or full-duplex.
6. Presentation Layer (OSI Layers)
• The data from the application layer is extracted here and manipulated as per the required
format to transmit over the network.
• The presentation layer is also called the Translation layer.
•Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the ciphertext and the decrypted data is known as plain text. A
key value is used for encrypting as well as decrypting data.
•Compression: Reduces the number of bits that need to be transmitted on the network.
• FTAM- File transfer access and management : This application allows a user to
access file in a remote host, retrieve files in remote host and manage or
control files from a remote computer.
• Mail Services : Provide email service.
• For example, Ethernet uses a 6-byte (48-bit) physical address that is imprinted on
the network interface card (NIC). LocalTalk (Apple), however, has a I-byte dynamic
address that changes each time the station comes up.
Logical Address
• Logical addresses are necessary for universal communications that are
independent of underlying physical networks.
• Physical addresses are not adequate in an internetwork environment where
different networks can have different address formats.
• A universal addressing system is needed in which each host can be identified
uniquely, regardless of the underlying physical network. The logical addresses
are designed for this purpose.
• A logical address in the Internet is currently a 32-bit address that can uniquely
define a host connected to the Internet.
• No two publicly addressed and visible hosts on the Internet can have the same
IP address.
Port Address
• The IP address and the physical address are necessary for a quantity of data to travel
from a source to the destination host. However, arrival at the destination host is not
the final objective of data communications on the Internet.
• A system that sends nothing but data from one computer to another is not complete.
Today, computers are devices that can run multiple processes at the same time. The
end objective of Internet communication is a process communicating with another
process.
• For example, computer A can communicate with computer C by using TELNET. At the
same time, computer A communicates with computer B by using the File Transfer
Protocol (FTP). For these processes to receive data simultaneously, we need a method
to label the different processes. In other words, they need addresses. In the TCPIIP
architecture, the label assigned to a process is called a port address. A port address in
TCP/IP is 16 bits in length.
Specific Address
• Some applications have user-friendly addresses that are designed for that
specific address.
• Examples include the e-mail address (for example, [email protected]) and
the Universal Resource Locator (URL) (for example, www.mhhe.com).
• The first defines the recipient of an e-mail; the second is used to find a
document on the World Wide Web. These addresses, however, get changed to
the corresponding port and logical addresses by the sending computer,
LAYER & ADDRESSES RELATIONSHIP in
TCP/IP
IP Addressing
• A unique string of numbers separated by full stops that identifies each computer
using the Internet Protocol to communicate over a network.
• The IP address is followed by a slash and the number (in decimal) of bits used
for the network part, also called the routing prefix. For example , an IPv4
address and its subnet mask may be 192.0.2.1 and 255.255.255.0, respectively.
2) https://www.geeksforgeeks.org/open-systems-interconnection-
model-osi
/