0% found this document useful (0 votes)
22 views67 pages

Networks Module1

Uploaded by

padma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views67 pages

Networks Module1

Uploaded by

padma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 67

Data Communication:

When we communicate we are sharing information.

sharing can be local or remote or Between


individuals

local communication : usually occurs face to face

remote communication : takes place over distance


Data Communication:

The transfer of data or information from one


location to another is called data
communication or data transmission.
The term telecommunication which includes
telephony, telegraphy, and television, means
communication at a distance (tele is Greek for
“far”).

The word data refers to information presented in


whatever form is agreed upon by the parties
creating and using the data.
• Data communications
are the exchange of data between two devices via
some form of transmission medium such as a wire
cable.

For data communications to occur, the


communicating devices must be part of a
communication system made up of a combination of
hardware (physical equipment) and software
(programs).
The effectiveness of a data communications
system depends on four fundamental
characteristics:
1. delivery
2. accuracy
3. timeliness
4. and jitter
Data communications system has five components
1. Message: The message is the information (data) to
be communicated. information include text,
numbers, pictures, audio, and video.

2. Sender: The sender is the device that sends the


data message. It can be a computer, workstation,
telephone handset, video camera

3. Receiver: the receiver is the device that receives


the message. It can be a computer, workstation,
telephone handset television
4. Transmission medium:
The transmission medium is the physical path by
which a message travels from sender to receiver.

Some examples of transmission media include


twisted-pair wire, coaxial cable, fiber-optic cable,
and radio waves.
• Protocol. A protocol is a set of rules that govern
data communications. It represents an
agreement between the communicating devices.

Without a protocol, two devices may be connected


but not communicating, just as a person
speaking French cannot be understood by a
person who speaks only Japanese.
Modes of data communication
• The manner in which data is transmitted from
one location to another is called data
transmission mode.
• There are three different modes for
transmitting data from one location to another.
1.Simplex
2.Half duplex
3. Full duplex
In simplex mode data is transmitted in only one
direction.

A terminal can only send data and cannot receive


data or it can only receive data but cannot send it.

In this mode the flow of information is uni directional.

It is not possible to confirm successful


transmission of data.
Example: TV remote controller is an example of
simplex mode
• In half-duplex mode data can be transmitted in
both directions but only in one direction at a
time.
• Therefore data can be sent and received
alternatively.
• Its disadvantage is that a lot of time is wasted in
changing direction of flow of data. So the
transmission rate for this mode is slow.
In full-duplex mode data can be transmitted in
both directions at the same time.

In this mode, no time is wasted in changing


direction of flow of data like Half-duplex
mode.

Therefore it is the fastest and most efficient


mode.

Mobile phone communication is an example


for full duplex
NETWORKS

• A network is the interconnection of a set of


devices capable of communication.
• a device can be a host or a large computer,
desktop, laptop, workstation, cellular phone,
or security system.
Advantages of Computer Network
• Data and information can be shared among
different users of a network.
• Resources like printer, CD drive, Hard disk
and software can be share.
• By sharing resources we can save large
amount of money.
• Expensive and costly software can also be
shared via networking.
Types of networks
1. PERSONAL AREA NETWORK
• is smallest network which is very
personal to a user.

• This may include Bluetooth enabled


devices.

• has connectivity range up to 10


meters.

• PAN may include wireless computer


keyboard, mouse, headphones printers
and TV remotes.
Local area networks
LAN covers an organization offices
schools colleges or universities.
Number of systems connected in LAN may
vary from as least as two to as much as 16
million.
LAN provides a useful way of sharing the
resources between end users.
The resources such as printers, file
servers, scanners, and internet are easily
sharable among computers. LANs are
composed of inexpensive
Wide area network
The Metropolitan Area Network (MAN)
generally expands throughout a city such as
cable TV network.

MAN can help an organization to connect


all of its offices in a city.
.
Wide area networks

As the name suggests the Wide


Area Network (WAN) covers a
wide area which may span across
provinces and even a whole
country

Generally, telecommunication
networks are Wide Area Network.
Networking devices
Network Topology

The arrangement of computers in a network is


called network topology.

OR

The physical layout of a network is called


network topology.
Bus topology

In Bus topology all devices share


single communication line or cable

.
Ring topology

In ring topology each host machine


connects to exactly two other machines
creating a circular network structure.

When one host tries to communicate or


send message to a host which is not
adjacent to it, the data travels through
all intermediate hosts.
Star topology

All hosts in Star topology are


connected to a central device
hub
Mesh topology

In this type of topology a host is


connected to one or multiple
hosts.

This topology has hosts in point-to-


point connection with every other
host or may also have hosts which
are in point-to-point connection to
few hosts only.
Hybrid topology

A network structure whose


design contains more than one
topology is said to be hybrid
topology.
Tree topology

Tree Topology Also known as


Hierarchical Topology, this is
the most common form of
network topology in use
presently.

This topology imitates as


extended Star topology and
inherits properties of bus
topology.
Networking devices
A communication device is hardware that is used
for transmission of information from one place to
another between computers and other dvices..
Network interface card
• A Network Interface Card (NIC) is used to
connect computers together to create
computer network.
• A network interface card (NIC) is a hardware
component without which a computer cannot
be connected over a network.

A network interface card


(NIC)is that is attached to
each computer on the
network.
A network interface card (NIC) is attached to each
computer on the network.

The NIC manufacturer assigns a unique physical


address to each NIC card this address is called as
Media Access Control Address(MAC address).

It consist of 6 bytes each byte is separated by ': '


first three bytes are manufacturer-id and last three
bytes are the card number assigned by
manufacturer to each card.
HUB
• HUB is A small rectangular box that joins
computers together through ports on the back
of the hub.

4-Port Ethernet Hub


Switch
• switches can identify the destination of a
packet.

• Switches send information only to the computer


that is suppose to receive the information.

• Switches can also send and retrieve information


at the same time which makes sending
information faster to retrieve than hubs.
Switch
Router
Bridge
bridge is a hardware device used to create a
connection between two separate computer
networks or to divide one network into two.
Gateway
A gateway is an internetworking device that is
capable of joining two different protocol based
network.
2-1 LAYERED TASKS

We use the concept of layers in our daily life. As an


example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a
friend would be complex if there were no services
available from the post office.

Topics discussd in this section:


Sender, Recliver, and Carrier
Hiérarchie

2.39
2-2 THE OSI MODEL

Established in 1947, the International Standards


Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards.

An ISO standard that covers all aspects of network


communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.

Topics discussed in this section:


Layered Architecture
Peer-to-Peer Processes
Encapsulation
2.40
OSI MODEL

OSI stands for Open System Interconnection is a


reference model

that describes how information from a software


application in one computer moves through a physical
medium to the software application in another
computer.
Figure 2.1 Tasks involved in sending a letter

2.42
Note

ISO is the organization.


OSI is the model.

2.43
Figure 2.2 Seven layers of the OSI model

2.44
• OSI consists of seven layers
• each layer performs a particular network function.
• OSI model was developed by the International
Organization for Standardization (ISO) in 1984
• it is now considered as an architectural model for the
inter-computer communications.
• OSI model divides the whole task into seven smaller and
manageable tasks.
• Each layer is assigned a particular task.

• Each layer is self-contained, so that task assigned to each


layer can be performed independently.
physical Layer
• The physical Layer is responsible for the
movement of individual bits from one (node)
to next node
• Physical layer is the primary layer of the OSI
layer
• It Used to transfer information in bits form
• The information can be both digital and analog
• Copper (Cu) cable is used for the transmission
• Physical layer devices are hardware's like
Repeaters, hubs, network interface cards (NIC),
cables, connector.
Data link layer
• Data Link Layer It organize bits into frames
• It provide node to node delivery
• Device used are Switch, Bridge, Ethernet
• This layer consist of 2 sublayers
1.logical link control (LLC) sublayer
2. Medium access control (MAC) sublayer

LLC acts act an interface between the network layer and


the medium access control (MAC) sublayer of the data
link layer.

Data link layer allows multipoint connection


Network layer
• Network Layer is responsible for providing
best path for data to reach the destination.
• Logical Addressing works on this layer.
• Router is a Network Layer device.
Network layer
• The network layer is responsible for the source to
destination delivery of a packet possibly across
multiple networks.

• 1. Data is in the form of Packets


• 2. Logical (IP) Addressing
• 3. Routing
• 4. Main protocols at this layer are IP, ICMP, ARP
Source-to-destination delivery
Transport layer
Transport layer
The transport layer is responsible for delivery of
a message from one process to another.
1. Reliable delivery of data
2. Ordering of delivery
3. Port addressing
4. Segmentation and reassembly
5. Connection control
6.Flow control and Error control
TCP

Transmission Control Protocol

Connection Oriented

Acknowledgement

Reliable

HTTP, FTP, SMTP


UDP
• User Datagram Protocol
• Connection Less
• No Acknowledgement •
• Unreliable Faster
• Port No. 17
• e.g. DNS, DHCP, TFTP
Session layer
Session layer
This OSI layer as the name implies:

1. Establishes a connection or session


2. Maintains
3. Ends sessions between nodes
4. Manage transmit data
Dialog controller i.e. whether connection is half
duplex or full duplex.
Presentation layer
It Defines the format of data being sent
The presentation layer is designed to handle the syntax and
semantics of the information exchanged between two systems
Main functions of this layer are
1. Compression
2. Encryption and Decryption
Some Examples of services used are listed below:
1. HTML (Hyper Text Markup Language)
2. GIF (Graphics Interchange Format)
3. JPEG (Joint Photographic Experts Group)
4. ASCII (American Standard Code for Information
PRESENTATION LAYER
Application layer
• Application layer is the top most layer of OSI
Model This is the layer that is closest to the
end user“ Applications is used for the users to
interact directly.
• A web browser (Google Chrome, Firefox,
Safari, etc.) or other app Skype, Outlook,
Office are examples of Layer 7 applications.
• To allow access to network resource
• Application Layer is responsible for providing
Networking Services to the user.
• It is also known as Desktop Layer.
• Identification of Services is done using Port
Numbers.
• Ports are Entry and Exit Points to the Layer
Reserved Ports 0 65535
Client Ports 1024 - 65535

You might also like