Data Comm Chap 1
Data Comm Chap 1
NETWORKING
1. Introduction To Data Communication And
Networking
Presented by:
Dr. Sachin Agrawal
ECE Department
Outline
• Network Hardware
• Network Software
Data Communication:
The term telecommunication means communication at a distance. The word data
refers to information presented in whatever form is agreed upon by the parties
creating and using the data. Data communications are the exchange of data
between two devices via some form of transmission medium such as a wire cable.
Networking:
A network is a set of devices (often referred to as nodes) connected by
communication links. A node can be a computer, printer, or any other device capable
of sending and/or receiving data generated by other nodes on the network. A link can
be a cable, air, optical fiber, or any medium which can transport a signal carrying
information.
Why it’s important: Data communication and networking underpin almost every 1
aspect of modern life, from personal communication to global commerce.
1. Introduction to Data Communication and
Networking
1.2 Components of Data Communication
Systems:
2
1. Introduction to Data Communication and
Networking
1.2 Components of Data Communication Systems:
1. Message:
The information or data being communicated.
Popular forms of information include text, numbers, pictures, audio, and video.
2. Sender:
The device that sends the data message.
Examples include a computer, workstation, telephone handset, or video camera.
3. Receiver:
The device that receives the data message.
Examples include a computer, workstation, telephone handset, or television.
3
1. Introduction to Data Communication and
Networking
1.2 Components of Data Communication Systems:
4. Transmission Medium:
The path by which a message travels from sender to receiver.
Examples include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
5. Protocol:
A set of rules governing data communication.
Ensures devices can communicate effectively, defining how data is transmitted.
4
1. Introduction to Data Communication and
1.3 Data Flow: Networking
2. Half-Duplex:
Bidirectional communication, but not at the same time.
Only one device can transmit while the other receives.
Example: Walkie-talkies, CB radios.
The entire channel is used alternately by both devices, like a one-lane road.
6
1. Introduction to Data Communication and
1.3 Data Flow: Networking
3. Full-Duplex:
Bidirectional communication simultaneously.
Both devices can transmit and receive at the same time.
Example: Telephone network.
Signals share the channel capacity, either using two separate transmission paths or by
dividing the channel’s bandwidth.
7
2. Uses of Computer Networks
2.1 Business Applications
• Communication: Email, video calls (e.g., Zoom, Skype), and social media
platforms like WhatsApp and Facebook rely on networks to enable real-time
communication across long distances.
9
2. Uses of Computer Networks
2.3 Mobile Users
• Access to Information and Services: With mobile networks, users can instantly
access services like email, online banking, and GPS navigation. They also use apps
and the internet to stay connected through social media, streaming, and video
calls. The convenience of being able to access vast amounts of information and
services while on the move is a major benefit.
10
2. Uses of Computer Networks
2.4 Social issues
• Internetworks:
When two or more networks are connected, they form an internetwork. The most
notable example is the Internet, a global network connecting millions of devices.
Internetworking allows seamless communication between different types of
networks. In the future, we may see even larger internetworks, such as the
proposed Interplanetary Internet, which aims to connect networks across space.
15
4. Network Software
4.1 Introduction
16
4. Network Software
4.2 Protocol Hierarchies
Practical Examples:
Consider the philosopher-translator-secretary analogy. Here, a philosopher (layer 5)
communicates a message through multiple layers: a translator (layer 2) and a
secretary (layer 1). The message is translated and transmitted, showcasing how each
layer adds or modifies information. In a technical context, data is segmented by layer
4, further processed by layer 3, and finally transmitted physically by layer 1. At the
18
destination, the data is reassembled as it ascends through the layers, with each layer
stripping off its specific headers and trailers. This hierarchical approach simplifies
the network design, making it more manageable and flexible.
4. Network Software
4.2 Protocol Hierarchies
1. Reliability
Error Detection: Uses codes to identify and detect errors in data.
Error Correction: Adds redundant information to recover from errors.
Implementation: Applied at low layers (link) and high layers (application).
5. Internetworking
Message Handling: Manages varying network capabilities like message order and
size.
Mechanisms: Breaks down and reassembles messages for compatibility.
6. Scalability
Network Growth: Ensures network design remains effective as the number of users
and devices increases.
Performance: Addresses issues like congestion and resource management.
10. Security
Confidentiality: Protects data from unauthorized access.
Authentication: Verifies identities to prevent impersonation.
Integrity: Ensures data is not altered during transmission.
Cryptography: Underpins security measures across the network.
22
4. Network Software
4.4 Connection-oriented versus Connectionless services
1. Connection-oriented Services:
Analogous to Telephone System:
Requires establishment, use, and release of a connection.
Reserves a dedicated path or "circuit" for communication.
Characteristics:
Ensures data arrives in the correct order.
Parameters like message size and quality of service are negotiated
beforehand.
Example: File transfers where data integrity and order are crucial.
Variations:
Message Sequences: Maintains boundaries between messages.
Byte Streams: No boundaries maintained; data is a continuous stream.
23
4. Network Software
4.4 Connection-oriented versus Connectionless services
1. Connection-oriented Services:
Mechanisms:
Acknowledgements confirm receipt of each message.
Overhead introduces slight delays but ensures data accuracy and order.
Applications:
Ideal for scenarios requiring high data integrity, such as file transfers.
24
4. Network Software
4.4 Connection-oriented versus Connectionless services
2. Connectionless Services:
Analogous to Postal System:
Messages (datagrams) are sent independently with their own destination
address.
No pre-established connection is required.
Characteristics:
Messages are routed individually and may experience varying arrival times.
Example: Streaming media or sending spam emails where occasional data
loss is acceptable.
Switching Methods:
Store-and-Forward: Complete message received before forwarding.
Cut-Through: Forwarding begins before the entire message is received.
25
4. Network Software
4.4 Connection-oriented versus Connectionless services
2. Connectionless Services:
Types:
Unreliable Datagram Service: No guarantee of message delivery or order;
used for speed and efficiency.
Acknowledged Datagram Service: Provides confirmation of receipt, balancing
reliability and efficiency.
Applications:
Unreliable Datagram: Suitable for applications like voice over IP and video
streaming where minor data loss is tolerable.
Request-Reply Service: Single message request with a reply, commonly used
in client-server communications (e.g., database queries).
26
4. Network Software
4.5 Service Primitives
Service Primitives:
Definition: Operations available to user processes for accessing network services.
Role: Tell the service to perform actions or report on actions taken.
Implementation: Often system calls that invoke the operating system to manage
packets.
Example:
Example:
resources.
4. Network Software
4.6 The Relationship of Services to Protocols
Services define what operations a layer provides to the layer above, focusing on the
functional interface. Protocols specify how these operations are implemented,
detailing the rules for packet exchange.
Services are about the interface between layers, while protocols govern
communication between peer entities. This separation allows protocols to change
without affecting the service interface.
31
5. Reference Models
5.1 The OSI Reference Model
1. Physical Layer: The Physical Layer is responsible for transmitting raw bits over
a physical medium. It defines the hardware aspects of the network, including
cables, connectors, and electrical signals. This layer ensures that bits are accurately
sent and received as electrical impulses, light signals, or radio waves.
2. Data Link Layer: The Data Link Layer organizes raw bits into frames, ensuring
error-free transmission over a local network. It manages frame synchronization,
error detection, and correction, and controls access to the shared medium. This
layer ensures reliable data transfer between directly connected devices.
3. Network Layer: The Network Layer handles the routing of packets across
multiple networks. It manages logical addressing, packet forwarding, and path
selection to ensure that data reaches its destination even through complex network
32
The TCP/IP Reference Model, the architecture behind the Internet, was developed
to support robust, flexible communication across diverse networks. Unlike the OSI
model, it consists of four layers:
1. Link Layer: This layer interfaces with physical transmission media and defines
how data is sent and received over various link types, such as Ethernet or serial
lines. It manages the communication between hosts and the network infrastructure,
ensuring compatibility across different physical and data link technologies.
2. Internet Layer: Serving as the core of the TCP/IP model, this layer is
responsible for routing packets from the source to the destination across
interconnected networks. It uses the Internet Protocol (IP) for addressing and
routing, and the Internet Control Message Protocol (ICMP) for diagnostic functions.
It allows packets to traverse different networks and arrive at their destination,
potentially out of order, which is managed by higher layers. 35
5. Reference Models
5.2 The TCP/IP Reference Model
4. Application Layer: The topmost layer encompasses all high-level protocols used
by applications. It handles network services and end-user interfaces, such as HTTP
for web browsing, FTP for file transfers, and SMTP for email. Unlike the OSI model,
the TCP/IP model combines the functionalities of the OSI's session and presentation
layers into this single layer, simplifying the protocol stack.